{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T08:31:42Z","timestamp":1774341102671,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFB3103800"],"award-info":[{"award-number":["2022YFB3103800"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2336205"],"award-info":[{"award-number":["U2336205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202230"],"award-info":[{"award-number":["62202230"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202231"],"award-info":[{"award-number":["62202231"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302224"],"award-info":[{"award-number":["62302224"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302226"],"award-info":[{"award-number":["62302226"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Yunnan Provincial New Research and Development Institution Cultivation Project","award":["202404BQ040148"],"award-info":[{"award-number":["202404BQ040148"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1109\/tcad.2025.3608056","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:32:09Z","timestamp":1757439129000},"page":"2028-2040","source":"Crossref","is-referenced-by-count":0,"title":["SERP-SCA: A Strengthened Side-Channel Attack Framework for FALCON Signature"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0853-1115","authenticated-orcid":false,"given":"Shuyi","family":"Chen","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3944-9968","authenticated-orcid":false,"given":"Honglin","family":"Shao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8791-1576","authenticated-orcid":false,"given":"Jingdian","family":"Ming","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3821-4050","authenticated-orcid":false,"given":"Yuejun","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5446-2014","authenticated-orcid":false,"given":"Yiwen","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1337-0655","authenticated-orcid":false,"given":"Yongbin","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WOSSPA.2011.5931464"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/357980.358017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref5","volume-title":"Falcon: Fast-Fourier lattice-based compact signatures over NTRU","author":"Prest","year":"2020"},{"key":"ref6","volume-title":"Crystals-dilithium","author":"Lyubashevsky","year":"2020"},{"key":"ref7","volume-title":"Algorand\u2019s Post-Quantum Blockchain Technology","year":"2025"},{"key":"ref8","first-page":"844","article-title":"pqm4: Testing and benchmarking NIST PQC on ARM cortex-M4","volume-title":"Proc. 2nd PQC Standardization Conf.","volume":"2019","author":"Kannwischer"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_21"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8413"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i1.60-88"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3359890"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9791"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3215913"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44223-1_4"},{"key":"ref18","first-page":"893","article-title":"New efficient, constant-time implementations of falcon","volume":"2019","author":"Pornin","year":"2019","journal-title":"Cryptol. ePrint Arch."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30634-1_19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-91820-9_8"},{"key":"ref21","first-page":"1","article-title":"Efficient error-tolerant side-channel attacks on GPV signatures based on ordinary least squares regression","volume":"2024","author":"Noh","year":"2024","journal-title":"Cryptol. ePrint Arch."},{"key":"ref22","first-page":"1","article-title":"SHIFT SNARE: Uncovering secret keys in FALCON via single-trace analysis","volume":"2025","author":"Qiu","year":"2025","journal-title":"Cryptol. ePrint Arch."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586131"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i3.141-164"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2757440"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978353"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i3.496-519"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3038701"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4020015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"ref32","first-page":"1","article-title":"Uncovering software-based power side-channel attacks on apple M1\/M2 systems","volume-title":"Proc. 61st ACM\/IEEE Design Autom. Conf.","author":"Chawla"},{"key":"ref33","first-page":"247","article-title":"Apple vs. EMA: Electromagnetic side channel attacks on apple CoreCrypto","volume-title":"Proc. 59th ACM\/IEEE Design Autom. Conf.","author":"Haas"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010047"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref36","first-page":"145","article-title":"Correlation power analysis of large word sizes","volume-title":"Proc. IET Irish Signals Syst. Conf.","author":"Tunstall"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.1-21"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0122-9"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.06.010"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_18"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3005338"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2024.i2.276-303"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2024.i4.483-508"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/43\/11450487\/11153992.pdf?arnumber=11153992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T05:16:57Z","timestamp":1774329417000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11153992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":43,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2025.3608056","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"value":"0278-0070","type":"print"},{"value":"1937-4151","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4]]}}}