Table 3 Tablulation of reported FIA and their characteristics for the different procedures of Dilithium signature scheme Countermeasure (Our Proposal): We propose to simply utilize a Dynamic_Loop_Counter countermeasure to keep track of the number of compared coefficients of the challenge polynomial. This loop counter information along with the result of the comparison operation can be used to protect against trivial skipping attacks. One can also adopt redundancy of varying degrees to further fortify the verification procedure. We agree that this is only an implementation level countermeasure and can therefore be circumvented by a more powerful attacker. However, these countermeasures do significantly increase the ability of an attacker to mount a successful attack. Rafer ta Tah 2 far a tahilatian af all faunlteiniectian attacke an the ver flare ro Aedes af Tilithinm cionatire