{"id":"https://openalex.org/W4210364563","doi":"https://doi.org/10.1007/978-3-030-95312-6_8","title":"Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA","display_name":"Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4210364563","doi":"https://doi.org/10.1007/978-3-030-95312-6_8"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-95312-6_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-95312-6_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079052950","display_name":"Weiqiong Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weiqiong Cao","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Building 1, yard 8, Shangdi West Road, Haidian District, Beijing, 100085, China","Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, South Fourth Street 4#, ZhongGuanCun, Beijing, 100190, China"],"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Building 1, yard 8, Shangdi West Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, South Fourth Street 4#, ZhongGuanCun, Beijing, 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065534778","display_name":"Hongsong Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongsong Shi","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Building 1, yard 8, Shangdi West Road, Haidian District, Beijing, 100085, China"],"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Building 1, yard 8, Shangdi West Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100380233","display_name":"Hua Chen","orcid":"https://orcid.org/0000-0003-0988-5979"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Chen","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, South Fourth Street 4#, ZhongGuanCun, Beijing, 100190, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, South Fourth Street 4#, ZhongGuanCun, Beijing, 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081577247","display_name":"Jiazhe Chen","orcid":"https://orcid.org/0000-0003-4797-0162"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiazhe Chen","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Building 1, yard 8, Shangdi West Road, Haidian District, Beijing, 100085, China"],"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Building 1, yard 8, Shangdi West Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100779119","display_name":"Limin Fan","orcid":"https://orcid.org/0009-0002-7390-0395"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Fan","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, South Fourth Street 4#, ZhongGuanCun, Beijing, 100190, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, South Fourth Street 4#, ZhongGuanCun, Beijing, 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, South Fourth Street 4#, ZhongGuanCun, Beijing, 100190, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, South Fourth Street 4#, ZhongGuanCun, Beijing, 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5079052950"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210160629"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.0859,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.92610837,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"169","last_page":"195"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7801511287689209},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.7219817638397217},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6806725859642029},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5507310032844543},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5498190522193909},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5143938660621643},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4449302852153778},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.42150089144706726},{"id":"https://openalex.org/keywords/lattice","display_name":"Lattice (music)","score":0.4160844683647156},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.38133859634399414},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2415676712989807},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.21757414937019348},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18030095100402832},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17823511362075806},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.13822099566459656},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06218728423118591}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7801511287689209},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.7219817638397217},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6806725859642029},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5507310032844543},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5498190522193909},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5143938660621643},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4449302852153778},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.42150089144706726},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.4160844683647156},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38133859634399414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2415676712989807},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.21757414937019348},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18030095100402832},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17823511362075806},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.13822099566459656},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06218728423118591},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-95312-6_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-95312-6_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W80562455","https://openalex.org/W99041652","https://openalex.org/W196044395","https://openalex.org/W940457550","https://openalex.org/W1485287820","https://openalex.org/W1499237070","https://openalex.org/W1520399166","https://openalex.org/W1532770887","https://openalex.org/W1547036183","https://openalex.org/W1592441913","https://openalex.org/W1829732909","https://openalex.org/W1921478076","https://openalex.org/W1935672779","https://openalex.org/W1989510734","https://openalex.org/W2072402822","https://openalex.org/W2111416661","https://openalex.org/W2122982257","https://openalex.org/W2125815652","https://openalex.org/W2126483728","https://openalex.org/W2141040012","https://openalex.org/W2159520802","https://openalex.org/W2405148462","https://openalex.org/W2504739128","https://openalex.org/W2511816434","https://openalex.org/W2533043266","https://openalex.org/W2621279043","https://openalex.org/W2774095756","https://openalex.org/W2796097963","https://openalex.org/W2814895833","https://openalex.org/W3003185916","https://openalex.org/W3005704743","https://openalex.org/W3096664316","https://openalex.org/W4229637647"],"related_works":["https://openalex.org/W2884894114","https://openalex.org/W4312921057","https://openalex.org/W2149234266","https://openalex.org/W2390942931","https://openalex.org/W2982358690","https://openalex.org/W1966142266","https://openalex.org/W4387370674","https://openalex.org/W2130871907","https://openalex.org/W4255730851","https://openalex.org/W4249541918"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
