{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:31:20Z","timestamp":1764174680797},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/iscas.2019.8702794","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:02:28Z","timestamp":1556730148000},"page":"1-5","source":"Crossref","is-referenced-by-count":15,"title":["Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography"],"prefix":"10.1109","author":[{"given":"James","family":"Howe","sequence":"first","affiliation":[]},{"given":"Ayesha","family":"Khalid","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Martinoli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]},{"given":"Elisabeth","family":"Oswald","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"CRYSTALS-Dilithium","author":"lyubashevsky","year":"2017","journal-title":"Technical Report National Institute of Standards and Technology"},{"key":"ref11","article-title":"Frodo KEM","author":"naehrig","year":"2017","journal-title":"Technical Report National Institute of Standards and Technology"},{"journal-title":"Post-quantum crypto project","year":"2016","key":"ref12"},{"journal-title":"Proposed Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process","year":"2016","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49890-4_9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref17","first-page":"383","article-title":"High precision discrete Gaussian sampling on FPGAs","author":"roy","year":"2013","journal-title":"International Conference on Selected Areas in Cryptography"},{"key":"ref18","first-page":"1","article-title":"Arithmetic coding and blinding countermeasures for lattice signatures","author":"saarinen","year":"2017","journal-title":"Journal of Cryptographic Engineering"},{"key":"ref19","article-title":"CRYSTALS-Kyber","author":"schwabe","year":"2017","journal-title":"Technical Report National Institute of Standards and Technology"},{"key":"ref4","first-page":"140","article-title":"Loop-abort faults on lattice-based fiat-shamir and hash-and-sign signatures","author":"espitau","year":"2016","journal-title":"International Conference on Selected Areas in Cryptography"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"ref6","first-page":"1535","article-title":"Loop-abort faults on lattice-based signature schemes and key exchange protocols","author":"espitau","year":"2018","journal-title":"IEEE Transactions on Computers"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134028"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2724713"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2642962"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_16"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1962.10490022"}],"event":{"name":"2019 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2019,5,26]]},"location":"Sapporo, Japan","end":{"date-parts":[[2019,5,29]]}},"container-title":["2019 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8682239\/8702066\/08702794.pdf?arnumber=8702794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:10:34Z","timestamp":1657840234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8702794\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iscas.2019.8702794","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}