{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:18:28Z","timestamp":1772893108169,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11704-021-0586-3","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:02:46Z","timestamp":1641600166000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["(Full) Leakage resilience of Fiat-Shamir signatures over lattices"],"prefix":"10.1007","volume":"16","author":[{"given":"Yuejun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yongbin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"key":"586_CR1","unstructured":"National Institute of Standards and Technology (NIST). Post-quantum cryptography standardization. 2016"},{"key":"586_CR2","unstructured":"Fouque P A, Hoffstein J, Kirchner P, Lyubashevsky V, Pornin T, Prest T, Ricosset T, Seiler G, Whyte W, Zhang Z F. FALCON: fast-Fourier lattice-based compact signatures over NTRU. Submission to the NIST Post-Quantum Cryptography Standardization. 2019"},{"issue":"1","key":"586_CR3","doi-asserted-by":"publisher","first-page":"238","DOI":"10.46586\/tches.v2018.i1.238-268","volume":"2018","author":"L Ducas","year":"2018","unstructured":"Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schwabe P, Seiler G, Stehl\u00e9 D. CRYSTALS-Dilithium: a lattice-based digital signature scheme. Journal of IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, 2018(1): 238\u2013268","journal-title":"Journal of IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"586_CR4","doi-asserted-by":"crossref","unstructured":"Fiat A, Shamir A. How to prove yourself: practical solutions to identification and signature problems. In: Proceedings on Advances in Cryptology \u2014 CRYPTO. 1987, 186\u2013194","DOI":"10.1007\/3-540-47721-7_12"},{"key":"586_CR5","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V. Fiat-Shamir with aborts: applications to lattice and factoring-based signatures. In: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security. 2009, 598\u2013616","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"586_CR6","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V. Lattice signatures without trapdoors. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2012, 738\u2013755","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"586_CR7","doi-asserted-by":"crossref","unstructured":"Ducas L, Durmus A, Lepoint T, Lyubashevsky V. Lattice signatures and bimodal Gaussians. In: Proceedings of the 33rd Annual Cryptology Conference. 2013, 40\u201356","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"586_CR8","doi-asserted-by":"crossref","unstructured":"Bai S, Galbraith S D. An improved compression technique for signatures based on learning with errors. In: Proceedings of Cryptographers\u2019 Track at the RSA Conference. 2014, 28\u201347","DOI":"10.1007\/978-3-319-04852-9_2"},{"key":"586_CR9","unstructured":"Bindel N, Akleylek S, Alkim E, Barreto P S L M, Buchmann J, Eaton E, Gutoski G, Kr\u00e4mer J, Longa P, Polat H, Ricardini J E, Zanon G. qTESLA. Submission to the NIST Post-Quantum Cryptography Standardization. 2019"},{"key":"586_CR10","doi-asserted-by":"crossref","unstructured":"Bruinderink L G, H\u00fclsing A, Lange T, Yarom Y. Flush, gauss, and reload \u2014 a cache attack on the BLISS lattice-based signature scheme. In: Proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems. 2016, 323\u2013345","DOI":"10.1007\/978-3-662-53140-2_16"},{"key":"586_CR11","doi-asserted-by":"crossref","unstructured":"Pessl P, Bruinderink L G, Yarom Y. To BLISS-B or no. to be: attacking strongSwan\u2019s implementation of post-quantum signatures. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017, 1843\u20131855","DOI":"10.1145\/3133956.3134023"},{"key":"586_CR12","unstructured":"Ducas L. Accelerating bliss: the geometry of ternary polynomials. Journal of IACR Cryptology ePrint Archive, 2014"},{"key":"586_CR13","doi-asserted-by":"crossref","unstructured":"Espitau T, Fouque P A, G\u00e9rard B, Tibouchi M. Side-channel attacks on BLISS lattice-based signatures: exploiting branch tracing against strongSwan and electromagnetic emanations in microcontrollers. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017, 1857\u20131874","DOI":"10.1145\/3133956.3134028"},{"key":"586_CR14","doi-asserted-by":"crossref","unstructured":"Dziembowski S, Pietrzak K. Leakage-resilient cryptography. In: Proceedings of 2008 49th Annual IEEE Symposium on Foundations of Computer Science. 2008, 293\u2013302","DOI":"10.1109\/FOCS.2008.56"},{"key":"586_CR15","doi-asserted-by":"crossref","unstructured":"Katz J, Vaikuntanathan V. Signature schemes with bounded leakage resilience. In: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security. 2009, 703\u2013720","DOI":"10.1007\/978-3-642-10366-7_41"},{"key":"586_CR16","doi-asserted-by":"crossref","unstructured":"Alwen J, Dodis Y, Wichs D. Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Proceedings of the 29th Annual International Cryptology Conference. 2009, 36\u201354","DOI":"10.1007\/978-3-642-03356-8_3"},{"key":"586_CR17","doi-asserted-by":"crossref","unstructured":"Dodis Y, Haralambiev K, Lopez-Alt A, Wichs D. Cryptography against continuous memory attacks. In: Proceedings of 2010 IEEE 51st Annual Symposium on Foundations of Computer Science. 2010, 511\u2013520","DOI":"10.1109\/FOCS.2010.56"},{"key":"586_CR18","doi-asserted-by":"crossref","unstructured":"Hazay C, L\u00f3pez-Alt A, Wee H, Wichs D. Leakage-Resilient cryptography from minimal assumptions. In: Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2013, 160\u2013176","DOI":"10.1007\/978-3-642-38348-9_10"},{"key":"586_CR19","doi-asserted-by":"crossref","unstructured":"Katz J, Wang N. Efficiency improvements for signature schemes with tight security reductions. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. 2003, 155\u2013164","DOI":"10.1145\/948109.948132"},{"key":"586_CR20","unstructured":"Goldwasser S, Kalai Y T, Peikert C, Vaikuntanathan V. Robustness of the learning with errors assumption. In: Proceedings of Innovations in Computer Science \u2014 ICS. 2010, 230\u2013240"},{"key":"586_CR21","doi-asserted-by":"crossref","unstructured":"Brakerski Z, D\u00f6ttling N. Hardness of LWE on general entropic distributions. In: Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2020, 551\u2013575","DOI":"10.1007\/978-3-030-45724-2_19"},{"key":"586_CR22","doi-asserted-by":"crossref","unstructured":"Garg S, Jain A, Sahai A. Leakage-resilient zero knowledge. In: Proceedings of the 31st Annual Cryptology Conference. 2011, 297\u2013315","DOI":"10.1007\/978-3-642-22792-9_17"},{"key":"586_CR23","doi-asserted-by":"crossref","unstructured":"Abdalla M, Fouque P A, Lyubashevsky V, Tibouchi M. Tightly-secure signatures from lossy identification schemes. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2012, 572\u2013590","DOI":"10.1007\/978-3-642-29011-4_34"},{"key":"586_CR24","doi-asserted-by":"crossref","unstructured":"Kiltz E, Lyubashevsky V, Schaffner C. A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model. In: Proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2018, 552\u2013586","DOI":"10.1007\/978-3-319-78372-7_18"},{"key":"586_CR25","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference. 1999, 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"586_CR26","unstructured":"Halderman J A, Schoen S D, Heninger N, Clarkson W, Paul W, Calandrino J A, Feldman A J, Appelbaum J, Felten E W. Lest we remember: Cold boot attacks on encryption keys. In: Proceedings of the 17th USENIX Security Symposium. 2008, 45\u201360"},{"key":"586_CR27","doi-asserted-by":"crossref","unstructured":"Akavia A, Goldwasser S, Vaikuntanathan V. Simultaneous hardcore bits and cryptography against memory attacks. In: Proceedings of the 6th Theory of Cryptography Conference. 2009, 474\u2013495","DOI":"10.1007\/978-3-642-00457-5_28"},{"key":"586_CR28","doi-asserted-by":"crossref","unstructured":"Naor M, Segev G. Public-key cryptosystems resilient to key leakage. In: Proceedings of the 29th Annual International Cryptology Conference. 2009, 18\u201335","DOI":"10.1007\/978-3-642-03356-8_2"},{"key":"586_CR29","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Kalai Y T, Katz J, Vaikuntanathan V. Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: Proceedings of IEEE 51st Annual Symposium on Foundations of Computer Science. 2010, 501\u2013510","DOI":"10.1109\/FOCS.2010.55"},{"key":"586_CR30","doi-asserted-by":"crossref","unstructured":"Dodis Y, Haralambiev K, L\u00f3pez-Alt A, Wichs D. Efficient public-key cryptography in the presence of key leakage. In: Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security. 2010, 613\u2013631","DOI":"10.1007\/978-3-642-17373-8_35"},{"key":"586_CR31","doi-asserted-by":"crossref","unstructured":"Boyle E, Segev G, Wichs D. Fully leakage-resilient signatures. In: Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2011, 89\u2013108","DOI":"10.1007\/978-3-642-20465-4_7"},{"key":"586_CR32","doi-asserted-by":"crossref","unstructured":"Malkin T, Teranishi I, Vahlis Y, Yung M. Signatures resilient to continual leakage on memory and computation. In: Proceedings of the 8th Theory of Cryptography Conference. 2011, 89\u2013106","DOI":"10.1007\/978-3-642-19571-6_7"},{"key":"586_CR33","doi-asserted-by":"crossref","unstructured":"Faust S, Hazay C, Nielsen J B, Nordholt P S, Zottarel A. Signature schemes secure against hard-to-invert leakage. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security. 2012, 98\u2013115","DOI":"10.1007\/978-3-642-34961-4_8"},{"key":"586_CR34","doi-asserted-by":"crossref","unstructured":"Nielsen J B, Venturi D, Zottarel A. Leakage-resilient signatures with graceful degradation. In: Proceedings of the 17th International Workshop on Public Key Cryptography. 2014, 362\u2013379","DOI":"10.1007\/978-3-642-54631-0_21"},{"issue":"1","key":"586_CR35","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 2008, 38(1): 97\u2013139","journal-title":"SIAM Journal on Computing"},{"key":"586_CR36","doi-asserted-by":"crossref","unstructured":"Alwen J, Krenn S, Pietrzak K, Wichs D. Learning with rounding, revisited \u2014 new reduction, properties and applications. In: Proceedings of the 33rd Annual Cryptology Conference. 2013, 57\u201374","DOI":"10.1007\/978-3-642-40041-4_4"},{"key":"586_CR37","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V, Neven G. One-shot verifiable encryption from lattices. In: Proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2017, 293\u2013323","DOI":"10.1007\/978-3-319-56620-7_11"},{"key":"586_CR38","doi-asserted-by":"crossref","unstructured":"Brakerski Z, D\u00f6ttling N. Lossiness and entropic hardness for Ring-LWE. In: Proceedings of the 18th Theory of Cryptography Conference. 2020, 1\u201327","DOI":"10.1007\/978-3-030-64375-1_1"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-021-0586-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-021-0586-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-021-0586-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T22:04:06Z","timestamp":1700431446000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-021-0586-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["586"],"URL":"https:\/\/doi.org\/10.1007\/s11704-021-0586-3","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"10 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"165819"}}