{"id":"https://openalex.org/W2911363511","doi":"https://doi.org/10.1109/iscas.2019.8702794","title":"Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography","display_name":"Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2911363511","doi":"https://doi.org/10.1109/iscas.2019.8702794","mag":"2911363511"},"language":"en","primary_location":{"id":"doi:10.1109/iscas.2019.8702794","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2019.8702794","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.qub.ac.uk/en/publications/4a44b58e-7939-4d16-8b7d-7fe7d9cc1eaa","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089584032","display_name":"James Howe","orcid":"https://orcid.org/0000-0002-6498-3099"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"James Howe","raw_affiliation_strings":["Department of Computer Science, University of Bristol, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045204653","display_name":"Ayesha Khalid","orcid":"https://orcid.org/0000-0002-4815-6966"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ayesha Khalid","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Northern Ireland","Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Northern Ireland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Northern Ireland","institution_ids":[]},{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Northern Ireland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058013122","display_name":"Marco Martinoli","orcid":"https://orcid.org/0000-0003-3398-9444"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Marco Martinoli","raw_affiliation_strings":["Department of Computer Science, University of Bristol, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049456178","display_name":"Francesco Regazzoni","orcid":"https://orcid.org/0000-0001-6385-0780"},"institutions":[{"id":"https://openalex.org/I57201433","display_name":"Universit\u00e0 della Svizzera italiana","ror":"https://ror.org/03c4atk17","country_code":"CH","type":"education","lineage":["https://openalex.org/I57201433"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Francesco Regazzoni","raw_affiliation_strings":["Advanced Learning and Research Institute, Universit\u00e0 della Svizzera Italiana, Switzerland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Advanced Learning and Research Institute, Universit\u00e0 della Svizzera Italiana, Switzerland","institution_ids":["https://openalex.org/I57201433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040494476","display_name":"Elisabeth Oswald","orcid":"https://orcid.org/0000-0001-7502-3184"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Elisabeth Oswald","raw_affiliation_strings":["Department of Computer Science, University of Bristol, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089584032"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":null,"apc_paid":null,"fwci":1.5894,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.87412068,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7378285527229309},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6823713779449463},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6412426829338074},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.6038239002227783},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4536643624305725},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4451366066932678},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.4371105134487152},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.37801995873451233},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3590065836906433},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3412715792655945},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14140745997428894}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7378285527229309},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6823713779449463},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6412426829338074},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.6038239002227783},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4536643624305725},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4451366066932678},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.4371105134487152},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.37801995873451233},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3590065836906433},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3412715792655945},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14140745997428894},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/iscas.2019.8702794","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2019.8702794","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/4a44b58e-7939-4d16-8b7d-7fe7d9cc1eaa","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/4a44b58e-7939-4d16-8b7d-7fe7d9cc1eaa","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Howe , J , Khalid , A , Martinoli , M , Regazonni , F &amp; Oswald , E 2019 , Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography . in 2019 IEEE International Symposium on Circuits and Systems (ISCAS) . Institute of Electrical and Electronics Engineers Inc. , International Symposium on Circuits and systems (ISCAS 19) , Spopro , Japan , 26/05/2019 . https://doi.org/10.1109/ISCAS.2019.8702794","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire/644437f0-a001-485d-9038-092f359d62ff","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/644437f0-a001-485d-9038-092f359d62ff","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Howe, J, Khalid, A, Martinoli, M, Regazzoni, F & Oswald, E 2019, Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography. in IEEE International Symposium on Circuits and Systems (ISCAS). < https://eprint.iacr.org/2019/206 >","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/644437f0-a001-485d-9038-092f359d62ff","is_oa":true,"landing_page_url":"https://eprint.iacr.org/2019/206","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/4a44b58e-7939-4d16-8b7d-7fe7d9cc1eaa","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/4a44b58e-7939-4d16-8b7d-7fe7d9cc1eaa","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Howe , J , Khalid , A , Martinoli , M , Regazonni , F &amp; Oswald , E 2019 , Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography . in 2019 IEEE International Symposium on Circuits and Systems (ISCAS) . Institute of Electrical and Electronics Engineers Inc. , International Symposium on Circuits and systems (ISCAS 19) , Spopro , Japan , 26/05/2019 . https://doi.org/10.1109/ISCAS.2019.8702794","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1814108365","display_name":null,"funder_award_id":"EP/N011635/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1014461153","https://openalex.org/W1987034518","https://openalex.org/W2061949491","https://openalex.org/W2093721992","https://openalex.org/W2412886904","https://openalex.org/W2552357046","https://openalex.org/W2560054270","https://openalex.org/W2563052397","https://openalex.org/W2571657973","https://openalex.org/W2578021477","https://openalex.org/W2765255210","https://openalex.org/W2765784230","https://openalex.org/W2789467483","https://openalex.org/W2799470819","https://openalex.org/W2900370870","https://openalex.org/W6626588369","https://openalex.org/W6732012846","https://openalex.org/W6732165260"],"related_works":["https://openalex.org/W2158491338","https://openalex.org/W2807901368","https://openalex.org/W2133733652","https://openalex.org/W2072658171","https://openalex.org/W2606392311","https://openalex.org/W2320042380","https://openalex.org/W2121017442","https://openalex.org/W2794898833","https://openalex.org/W1790664656","https://openalex.org/W2751059292"],"abstract_inverted_index":{"Lattice-based":[0],"cryptography":[1],"is":[2,52,85,113,164],"one":[3],"of":[4,21,29,49,64,148,177],"the":[5,105,124,149,160,175],"leading":[6],"candidates":[7],"for":[8,58,171],"NIST's":[9],"post-quantum":[10],"standardisation":[11],"effort,":[12],"providing":[13],"efficient":[14],"key":[15],"encapsulation":[16],"and":[17,31,55,93,96,155,182],"signature":[18],"schemes.":[19],"Most":[20],"these":[22,89,109,178],"schemes":[23],"base":[24],"their":[25],"hardness":[26],"on":[27,35,45,141,180,185],"variants":[28],"LWE,":[30],"thus":[32],"rely":[33],"heavily":[34],"error":[36,110,142],"samplers":[37,125],"to":[38,69,75,81,87,122,134,152,167],"provide":[39],"necessary":[40],"uncertainty":[41],"by":[42,118],"obfuscating":[43],"computations":[44],"secret":[46],"information.":[47,72],"Because":[48],"this":[50,67],"it":[51,84],"a":[53,186,198],"clear":[54],"obvious":[56],"target":[57],"side-channel":[59,97],"analysis,":[60],"with":[61],"numerous":[62],"types":[63],"attacks":[65,140],"targeting":[66],"component":[68],"gain":[70],"secret-key":[71],"In":[73],"order":[74],"bring":[76],"potential":[77],"lattice-based":[78],"cryptographic":[79],"standards":[80],"practical":[82],"realisation,":[83],"important":[86],"protect":[88,135],"modules":[90],"from":[91,108],"past":[92],"future":[94],"fault":[95,139],"attacks.":[98],"This":[99],"paper":[100],"proposes":[101],"countermeasures":[102,131,179],"that":[103,112],"exploit":[104],"distributions":[106],"expected":[107],"samples,":[111],"either":[114],"Gaussian":[115],"or":[116],"binomial,":[117],"using":[119],"statistical":[120],"tests":[121,151],"verify":[123],"are":[126,132],"operating":[127],"properly.":[128],"The":[129],"novel":[130],"designed":[133],"against":[136],"all":[137],"previous":[138],"samplers.":[143],"We":[144,173],"optimize":[145],"hardware":[146],"implementation":[147],"proposed":[150],"avoid":[153],"division":[154],"square":[156],"root":[157],"calculations,":[158],"however,":[159],"countermeasure":[161,191],"we":[162],"propose":[163],"sufficiently":[165],"generic":[166],"be":[168],"suitable":[169],"also":[170],"software.":[172],"measure":[174],"impact":[176],"performance":[181,194],"area":[183],"consumption":[184],"Xilinx":[187],"Artix-7":[188],"FPGA.":[189],"Our":[190],"achieve":[192],"promising":[193],"while":[195],"resulting":[196],"in":[197],"minimal":[199],"overhead.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2025-10-10T00:00:00"}
