{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T12:32:56Z","timestamp":1770985976855,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3321705.3329821","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"427-440","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Exploiting Determinism in Lattice-based Signatures"],"prefix":"10.1145","author":[{"given":"Prasanna","family":"Ravi","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Mahabir Prasad","family":"Jhanwar","sequence":"additional","affiliation":[{"name":"Ashoka University, Delhi, India"}]},{"given":"James","family":"Howe","sequence":"additional","affiliation":[{"name":"PQShield, Ltd., Oxford, United Kingdom"}]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31517-1_3"},{"key":"e_1_3_2_1_2_1","volume-title":"Cryptographers' Track at the RSA Conference","author":"Ambrose Christopher","unstructured":"Christopher Ambrose , Joppe W Bos , Bj\u00f6rn Fay , Marc Joye , Manfred Lochter , and Bruce Murray . 2018. Differential attacks on deterministic signatures . In Cryptographers' Track at the RSA Conference . Springer , 339--353. Christopher Ambrose, Joppe W Bos, Bj\u00f6rn Fay, Marc Joye, Manfred Lochter, and Bruce Murray. 2018. Differential attacks on deterministic signatures. In Cryptographers' Track at the RSA Conference. Springer, 339--353."},{"key":"e_1_3_2_1_3_1","first-page":"28","article-title":"An Improved Compression Technique for Signatures Based on Learning with Errors","volume":"8366","author":"Bai Shi","year":"2014","unstructured":"Shi Bai and Steven D Galbraith . 2014 . An Improved Compression Technique for Signatures Based on Learning with Errors .. In CT-RSA , Vol. 8366. 28 -- 47 . Shi Bai and Steven D Galbraith. 2014. An Improved Compression Technique for Signatures Based on Learning with Errors.. In CT-RSA, Vol. 8366. 28--47.","journal-title":"CT-RSA"},{"key":"e_1_3_2_1_4_1","volume-title":"Brooks Campbell, et al.","author":"Barends Rami","year":"2014","unstructured":"Rami Barends , Julian Kelly , Anthony Megrant , Andrzej Veitia , Daniel Sank , Evan Jeffrey , Ted C White , Josh Mutus , Austin G Fowler , Brooks Campbell, et al. 2014 . Superconducting quantum circuits at the surface code threshold for fault tolerance. Nature , Vol. 508 , 7497 (2014), 500--503. Rami Barends, Julian Kelly, Anthony Megrant, Andrzej Veitia, Daniel Sank, Evan Jeffrey, Ted C White, Josh Mutus, Austin G Fowler, Brooks Campbell, et al. 2014. Superconducting quantum circuits at the surface code threshold for fault tolerance. Nature, Vol. 508, 7497 (2014), 500--503."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44524-3_11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.11"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125502.3125546"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_16"},{"key":"e_1_3_2_1_11_1","article-title":"Differential Fault Attacks on Deterministic Lattice Signatures","volume":"2018","author":"Bruinderink Leon Groot","year":"2018","unstructured":"Leon Groot Bruinderink and Peter Pessl . 2018 . Differential Fault Attacks on Deterministic Lattice Signatures . IACR Transactions on Cryptographic Hardware and Embedded Systems , Vol. 2018 , 3 (2018). https:\/\/eprint.iacr.org\/2018\/355.pdf. Leon Groot Bruinderink and Peter Pessl. 2018. Differential Fault Attacks on Deterministic Lattice Signatures. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, 3 (2018). https:\/\/eprint.iacr.org\/2018\/355.pdf.","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_3_2_1_12_1","volume-title":"Advances in Cryptology--CRYPTO","author":"Ducas L\u00e9o","year":"2013","unstructured":"L\u00e9o Ducas , Alain Durmus , Tancr\u00e8de Lepoint , and Vadim Lyubashevsky . 2013. Lattice signatures and bimodal Gaussians . In Advances in Cryptology--CRYPTO 2013 . Springer , 40--56. L\u00e9o Ducas, Alain Durmus, Tancr\u00e8de Lepoint, and Vadim Lyubashevsky. 2013. Lattice signatures and bimodal Gaussians. In Advances in Cryptology--CRYPTO 2013. Springer, 40--56."},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 140--158","author":"Espitau Thomas","year":"2016","unstructured":"Thomas Espitau , Pierre-Alain Fouque , Beno^it G\u00e9rard, and Mehdi Tibouchi . 2016 . Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures . In International Conference on Selected Areas in Cryptography. Springer, 140--158 . Thomas Espitau, Pierre-Alain Fouque, Beno^it G\u00e9rard, and Mehdi Tibouchi. 2016. Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures. In International Conference on Selected Areas in Cryptography. Springer, 140--158."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134028"},{"key":"e_1_3_2_1_15_1","volume-title":"Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols","author":"Espitau Thomas","year":"2018","unstructured":"Thomas Espitau , Pierre-Alain Fouque , Benoit Gerard , and Mehdi Tibouchi . 2018. Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols . IEEE Trans. Comput . ( 2018 ). Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, and Mehdi Tibouchi. 2018. Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols. IEEE Trans. Comput. (2018)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_31"},{"key":"e_1_3_2_1_17_1","unstructured":"Matthias J. Kannwischer Joost Rijneveld Peter Schwabe and Ko Stoffelen. {n. d.}. PQM4: Post-quantum crypto library for the ARM Cortex-M4. https:\/\/github.com\/mupq\/pqm4.  Matthias J. Kannwischer Joost Rijneveld Peter Schwabe and Ko Stoffelen. {n. d.}. PQM4: Post-quantum crypto library for the ARM Cortex-M4. https:\/\/github.com\/mupq\/pqm4."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"e_1_3_2_1_19_1","volume-title":"Technical Report","author":"Lyubashevsky Vadim","unstructured":"Vadim Lyubashevsky , Leo Ducas , Eike Kiltz , Tancrede Lepoint , Peter Schwabe , Gregor Seiler , and Damien Stehle . 2017. CRYSTALS-Dilithium. Technical Report . National Institute of Standards and Technology . available at https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-1-submissions. Vadim Lyubashevsky, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Peter Schwabe, Gregor Seiler, and Damien Stehle. 2017. CRYSTALS-Dilithium. Technical Report. National Institute of Standards and Technology. available at https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-1-submissions."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00037-007-0234-9"},{"key":"e_1_3_2_1_22_1","unstructured":"National Institute of Standards and Technology. 2016. Post-Quantum Crypto Project. http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/.  National Institute of Standards and Technology. 2016. Post-Quantum Crypto Project. http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/."},{"key":"e_1_3_2_1_24_1","unstructured":"NIST. 2016. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. https:\/\/csrc.nist.gov\/csrc\/media\/projects\/post-quantum-cryptography\/documents\/call-for-proposals-final-dec-2016.pdf .  NIST. 2016. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. https:\/\/csrc.nist.gov\/csrc\/media\/projects\/post-quantum-cryptography\/documents\/call-for-proposals-final-dec-2016.pdf ."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49890-4_9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134023"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16350-1_13"},{"key":"e_1_3_2_1_29_1","volume-title":"High precision fault injections on the instruction cache of ARMv7-M architectures. arXiv preprint arXiv:1510.01537","author":"Riviere Lionel","year":"2015","unstructured":"Lionel Riviere , Zakaria Najm , Pablo Rauzy , Jean-Luc Danger , Julien Bringer , and Laurent Sauvage . 2015. High precision fault injections on the instruction cache of ARMv7-M architectures. arXiv preprint arXiv:1510.01537 ( 2015 ). Lionel Riviere, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, and Laurent Sauvage. 2015. High precision fault injections on the instruction cache of ARMv7-M architectures. arXiv preprint arXiv:1510.01537 (2015)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2010.14"}],"event":{"name":"Asia CCS '19: ACM Asia Conference on Computer and Communications Security","location":"Auckland New Zealand","acronym":"Asia CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321705.3329821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329821"}},"subtitle":["Practical Fault Attacks on pqm4 Implementations of NIST Candidates"],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":27,"alternative-id":["10.1145\/3321705.3329821","10.1145\/3321705"],"URL":"https:\/\/doi.org\/10.1145\/3321705.3329821","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}