{"id":"https://openalex.org/W2961566779","doi":"https://doi.org/10.1145/3321705.3329821","title":"Exploiting Determinism in Lattice-based Signatures","display_name":"Exploiting Determinism in Lattice-based Signatures","publication_year":2019,"publication_date":"2019-07-02","ids":{"openalex":"https://openalex.org/W2961566779","doi":"https://doi.org/10.1145/3321705.3329821","mag":"2961566779"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321705.3329821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079410091","display_name":"Prasanna Ravi","orcid":"https://orcid.org/0000-0003-0201-3705"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Prasanna Ravi","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046851778","display_name":"Mahabir Prasad Jhanwar","orcid":"https://orcid.org/0000-0002-9753-2999"},"institutions":[{"id":"https://openalex.org/I347237974","display_name":"Ashoka University","ror":"https://ror.org/02j1xr113","country_code":"IN","type":"education","lineage":["https://openalex.org/I347237974"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mahabir Prasad Jhanwar","raw_affiliation_strings":["Ashoka University, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Ashoka University, Delhi, India","institution_ids":["https://openalex.org/I347237974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089584032","display_name":"James Howe","orcid":"https://orcid.org/0000-0002-6498-3099"},"institutions":[],"countries":["GB"],"is_corresponding":false,"raw_author_name":"James Howe","raw_affiliation_strings":["PQShield, Ltd., Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"PQShield, Ltd., Oxford, United Kingdom","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081720773","display_name":"Shivam Bhasin","orcid":"https://orcid.org/0000-0002-6903-5127"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Shivam Bhasin","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.984,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.842408,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptanalysis of Block Ciphers and Hash Functions","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.6122714},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.59576935},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based Cryptography","score":0.595666},{"id":"https://openalex.org/keywords/searchable-encryption","display_name":"Searchable Encryption","score":0.507817},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-Based Encryption","score":0.507374},{"id":"https://openalex.org/keywords/fault-attacks","display_name":"Fault Attacks","score":0.504727},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4984424},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4343083}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7497155},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6203791},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.6122714},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.59576935},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4984424},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4754576},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4343083},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.43334392},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.42640206},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.38925016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36239675},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3607771},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34318435},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1589407},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1410363},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.114343494},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0825786},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321705.3329821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.68,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W147447691","https://openalex.org/W1506156414","https://openalex.org/W1834056812","https://openalex.org/W1968850365","https://openalex.org/W2030986741","https://openalex.org/W2037107113","https://openalex.org/W2071825329","https://openalex.org/W2122086332","https://openalex.org/W2183171747","https://openalex.org/W2294366282","https://openalex.org/W2412886904","https://openalex.org/W2511816434","https://openalex.org/W2552357046","https://openalex.org/W2560054270","https://openalex.org/W2578021477","https://openalex.org/W2621279043","https://openalex.org/W2765255210","https://openalex.org/W2765784230","https://openalex.org/W2766990535","https://openalex.org/W2799470819","https://openalex.org/W2894517745","https://openalex.org/W2900370870","https://openalex.org/W2921053303","https://openalex.org/W3030554837","https://openalex.org/W4213189636","https://openalex.org/W4229637647","https://openalex.org/W49132692"],"related_works":["https://openalex.org/W3186483655","https://openalex.org/W3131045674","https://openalex.org/W3097058029","https://openalex.org/W3043278706","https://openalex.org/W3037520371","https://openalex.org/W2364473550","https://openalex.org/W1948158591","https://openalex.org/W1946499719","https://openalex.org/W1592120122","https://openalex.org/W1497363736"],"abstract_inverted_index":{"In":[0,15],"this":[1],"paper,":[2],"we":[3,17,83],"analyze":[4],"the":[5,19,41,55,65,72,79,91,100,104,123,137,172],"implementation":[6],"level":[7],"fault":[8,23,116,157],"vulnerabilities":[9],"of":[10,21,27,44,64,103,111],"deterministic":[11],"lattice-based":[12],"signature":[13,33],"schemes.":[14],"particular,":[16],"extend":[18],"practicality":[20],"skip-addition":[22,156],"attacks":[24,146],"through":[25],"exploitation":[26],"determinism":[28],"in":[29,54,71,179],"Dilithium":[30],"and":[31,128],"qTESLA":[32],"schemes,":[34],"which":[35],"are":[36],"two":[37,148],"leading":[38],"candidates":[39],"for":[40,131,136],"NIST":[42],"standardization":[43],"post-quantum":[45],"cryptography.":[46],"We":[47,107,141,159],"show":[48,143],"that":[49,89,144,169],"single":[50],"targeted":[51],"faults":[52,69],"injected":[53,70],"signing":[56,73],"procedure":[57,74],"allow":[58],"to":[59,93,153],"recover":[60,77],"an":[61,162],"important":[62],"portion":[63,102],"secret":[66,80,105],"key.":[67,106],"Though":[68],"do":[75],"not":[76],"all":[78],"key":[81],"elements,":[82],"propose":[84,161],"a":[85,126],"novel":[86],"forgery":[87],"algorithm":[88],"allows":[90],"attacker":[92],"sign":[94],"any":[95],"given":[96],"message":[97],"with":[98],"only":[99],"extracted":[101],"perform":[108],"experimental":[109],"validation":[110],"our":[112,145,167],"attack":[113,168],"using":[114],"Electromagnetic":[115],"injection":[117],"on":[118],"reference":[119],"implementations":[120,135],"taken":[121],"from":[122],"pqm4":[124],"library,":[125],"benchmarking":[127],"testing":[129],"framework":[130],"post":[132],"quantum":[133],"cryptographic":[134],"ARM":[138],"Cortex-M4":[139],"microcontroller.":[140],"also":[142],"break":[147],"well":[149],"known":[150,152],"countermeasures":[151],"protect":[154],"against":[155,166],"attacks.":[158],"further":[160],"efficient":[163],"mitigation":[164],"strategy":[165],"exponentially":[170],"increases":[171],"attacker's":[173],"complexity":[174],"at":[175],"almost":[176],"zero":[177],"increase":[178],"computational":[180],"complexity.":[181]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2961566779","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2024-11-22T13:49:58.230276","created_date":"2019-07-23"}