{"id":"https://openalex.org/W2961566779","doi":"https://doi.org/10.1145/3321705.3329821","title":"Exploiting Determinism in Lattice-based Signatures","display_name":"Exploiting Determinism in Lattice-based Signatures","publication_year":2019,"publication_date":"2019-07-02","ids":{"openalex":"https://openalex.org/W2961566779","doi":"https://doi.org/10.1145/3321705.3329821","mag":"2961566779"},"language":"en","primary_location":{"id":"doi:10.1145/3321705.3329821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321705.3329821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079410091","display_name":"Prasanna Ravi","orcid":"https://orcid.org/0000-0003-0201-3705"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Prasanna Ravi","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046851778","display_name":"Mahabir Prasad Jhanwar","orcid":"https://orcid.org/0000-0002-9753-2999"},"institutions":[{"id":"https://openalex.org/I347237974","display_name":"Ashoka University","ror":"https://ror.org/02j1xr113","country_code":"IN","type":"education","lineage":["https://openalex.org/I347237974"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mahabir Prasad Jhanwar","raw_affiliation_strings":["Ashoka University, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Ashoka University, Delhi, India","institution_ids":["https://openalex.org/I347237974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089584032","display_name":"James Howe","orcid":"https://orcid.org/0000-0002-6498-3099"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"James Howe","raw_affiliation_strings":["PQShield, Ltd., Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"PQShield, Ltd., Oxford, United Kingdom","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081720773","display_name":"Shivam Bhasin","orcid":"https://orcid.org/0000-0002-6903-5127"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Shivam Bhasin","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5079410091"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":1.9602,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.89705317,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"427","last_page":"440"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7497155070304871},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6203790903091431},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.6122714281082153},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5957693457603455},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4984424114227295},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4754576086997986},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4343082904815674},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.43334391713142395},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.4264020621776581},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.38925015926361084},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3623967468738556},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3607771098613739},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34318435192108154},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15894070267677307},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14103630185127258},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11434349417686462},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08257859945297241}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7497155070304871},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6203790903091431},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.6122714281082153},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5957693457603455},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4984424114227295},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4754576086997986},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4343082904815674},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.43334391713142395},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.4264020621776581},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.38925015926361084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3623967468738556},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3607771098613739},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34318435192108154},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15894070267677307},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14103630185127258},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11434349417686462},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08257859945297241},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3321705.3329821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3321705.3329821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W49132692","https://openalex.org/W147447691","https://openalex.org/W1506156414","https://openalex.org/W1834056812","https://openalex.org/W1968850365","https://openalex.org/W2030986741","https://openalex.org/W2037107113","https://openalex.org/W2071825329","https://openalex.org/W2122086332","https://openalex.org/W2183171747","https://openalex.org/W2294366282","https://openalex.org/W2412886904","https://openalex.org/W2511816434","https://openalex.org/W2552357046","https://openalex.org/W2560054270","https://openalex.org/W2578021477","https://openalex.org/W2621279043","https://openalex.org/W2765255210","https://openalex.org/W2765784230","https://openalex.org/W2766990535","https://openalex.org/W2799470819","https://openalex.org/W2894517745","https://openalex.org/W2900370870","https://openalex.org/W2921053303","https://openalex.org/W3030315577","https://openalex.org/W3030554837","https://openalex.org/W4213189636","https://openalex.org/W4229637647"],"related_works":["https://openalex.org/W1497363736","https://openalex.org/W3043278706","https://openalex.org/W1946499719","https://openalex.org/W1592120122","https://openalex.org/W3186483655","https://openalex.org/W1948158591","https://openalex.org/W2364473550","https://openalex.org/W3131045674","https://openalex.org/W3097058029","https://openalex.org/W3037520371"],"abstract_inverted_index":{"In":[0,15],"this":[1],"paper,":[2],"we":[3,17,83],"analyze":[4],"the":[5,19,41,55,65,72,79,91,100,104,123,137,172],"implementation":[6],"level":[7],"fault":[8,23,116,157],"vulnerabilities":[9],"of":[10,21,27,44,64,103,111],"deterministic":[11],"lattice-based":[12],"signature":[13,33],"schemes.":[14],"particular,":[16],"extend":[18],"practicality":[20],"skip-addition":[22,156],"attacks":[24,146],"through":[25],"exploitation":[26],"determinism":[28],"in":[29,54,71,179],"Dilithium":[30],"and":[31,128],"qTESLA":[32],"schemes,":[34],"which":[35],"are":[36],"two":[37,148],"leading":[38],"candidates":[39],"for":[40,131,136],"NIST":[42],"standardization":[43],"post-quantum":[45],"cryptography.":[46],"We":[47,107,141,159],"show":[48,143],"that":[49,89,144,169],"single":[50],"targeted":[51],"faults":[52,69],"injected":[53,70],"signing":[56,73],"procedure":[57,74],"allow":[58],"to":[59,93,153],"recover":[60,77],"an":[61,162],"important":[62],"portion":[63,102],"secret":[66,80,105],"key.":[67,106],"Though":[68],"do":[75],"not":[76],"all":[78],"key":[81],"elements,":[82],"propose":[84,161],"a":[85,126],"novel":[86],"forgery":[87],"algorithm":[88],"allows":[90],"attacker":[92],"sign":[94],"any":[95],"given":[96],"message":[97],"with":[98],"only":[99],"extracted":[101],"perform":[108],"experimental":[109],"validation":[110],"our":[112,145,167],"attack":[113,168],"using":[114],"Electromagnetic":[115],"injection":[117],"on":[118],"reference":[119],"implementations":[120,135],"taken":[121],"from":[122],"pqm4":[124],"library,":[125],"benchmarking":[127],"testing":[129],"framework":[130],"post":[132],"quantum":[133],"cryptographic":[134],"ARM":[138],"Cortex-M4":[139],"microcontroller.":[140],"also":[142],"break":[147],"well":[149],"known":[150,152],"countermeasures":[151],"protect":[154],"against":[155,166],"attacks.":[158],"further":[160],"efficient":[163],"mitigation":[164],"strategy":[165],"exponentially":[170],"increases":[171],"attacker's":[173],"complexity":[174],"at":[175],"almost":[176],"zero":[177],"increase":[178],"computational":[180],"complexity.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
