Open aewag opened 6 days ago
Yes
I didnot find DOIs for the following references:
[
{
"volume": "124",
"volume-title": "New Results on Instruction Cache Attacks. In CHES 2010 (LNCS",
"year": "2010",
"author": "Onur Aciic",
"key": "e_1_3_2_2_1_1"
},
{
"volume": "203",
"volume-title": "New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. In 11th IMA International Conference on Cryptography and Coding (LNCS",
"year": "2007",
"author": "Onur Aciic",
"key": "e_1_3_2_2_2_1"
},
{
"volume-title": "Cheap Hardware Parallelism Implies Cheap Security. In Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography",
"author": "Onur",
"key": "e_1_3_2_2_3_1"
},
{
"volume-title": "Katrina E. Falkner, Joop van de Pol, and Yuval Yarom.",
"year": "2016",
"author": "Allan Thomas",
"key": "e_1_3_2_2_4_1"
},
{
"key": "e_1_3_2_2_5_1",
"unstructured": "D. F. Aranha etalmbox. [n.d.]. RELIC is an Efficient LIbrary for Cryptography . https://github.com/relic-toolkit/relic . D. F. Aranha et almbox. [n.d.]. RELIC is an Efficient LIbrary for Cryptography . https://github.com/relic-toolkit/relic ."
},
{
"volume": "385",
"volume-title": "Improved Generic Algorithms for Hard Knapsacks. In EUROCRYPT 2011 (LNCS",
"year": "2011",
"author": "Becker Anja",
"key": "e_1_3_2_2_7_1"
},
{
"volume": "92",
"volume-title": "Long Way. In CHES 2014 (LNCS",
"author": "Benger Naomi",
"key": "e_1_3_2_2_9_1"
},
{
"volume": "50",
"volume-title": "Faster Addition and Doubling on Elliptic Curves. In ASIACRYPT 2007 (LNCS",
"author": "Daniel",
"key": "e_1_3_2_2_12_1"
},
{
"key": "e_1_3_2_2_13_1",
"unstructured": "Daniel Bleichenbacher. 2000. On the generation of one-time keys in DL signature schemes. Presentation at IEEE P1363 working group meeting. Daniel Bleichenbacher. 2000. On the generation of one-time keys in DL signature schemes. Presentation at IEEE P1363 working group meeting."
},
{
"volume-title": "Experiments with DSA . Rump session at CRYPTO",
"year": "2005",
"author": "Bleichenbacher Daniel",
"key": "e_1_3_2_2_14_1"
},
{
"volume": "142",
"volume-title": "Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. In CRYPTO'96 (LNCS",
"year": "1996",
"author": "Boneh Dan",
"key": "e_1_3_2_2_15_1"
},
{
"volume": "371",
"volume-title": "Remote Timing Attacks Are Still Practical. In ESORICS 2011 (LNCS",
"year": "2011",
"author": "Brumley Billy Bob",
"key": "e_1_3_2_2_17_1"
},
{
"volume-title": "Port Contention for Fun and Profit. In 2019 IEEE Symposium on Security and Privacy . IEEE Computer Society Press, 870--887",
"year": "2019",
"author": "Aldaya Alejandro Cabrera",
"key": "e_1_3_2_2_18_1"
},
{
"volume-title": "Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, and Yuval Yarom.",
"year": "2018",
"author": "Dall Fergus",
"key": "e_1_3_2_2_22_1"
},
{
"volume": "452",
"volume-title": "CHES 2013 (LNCS",
"year": "2013",
"author": "Mulder Elke De",
"key": "e_1_3_2_2_23_1"
},
{
"key": "e_1_3_2_2_26_1",
"first-page": "2",
"article-title": "High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers",
"volume": "77",
"author": "Michael D\u00fc",
"year": "2015",
"journal-title": "Des. Codes Cryptogr."
},
{
"volume-title": "C\u00e9 dric Murdica, and David Naccache",
"year": "2016",
"author": "Fouque Pierre-Alain",
"key": "e_1_3_2_2_27_1"
},
{
"volume-title": "USENIX Security 2018 ,",
"author": "Gras Ben",
"key": "e_1_3_2_2_31_1"
},
{
"volume-title": "USENIX Security",
"year": "2015",
"author": "Gruss Daniel",
"key": "e_1_3_2_2_33_1"
},
{
"volume": "256",
"volume-title": "New Generic Algorithms for Hard Knapsacks. In EUROCRYPT 2010 (LNCS",
"year": "2010",
"author": "Howgrave-Graham Nick",
"key": "e_1_3_2_2_35_1"
},
{
"volume-title": "Thomas Eisenbarth, and Berk Sunar.",
"year": "2014",
"author": "Apecechea Gorka Irazoqui",
"key": "e_1_3_2_2_37_1"
},
{
"volume-title": "USENIX Security",
"year": "2017",
"author": "Lee Sangho",
"key": "e_1_3_2_2_39_1"
},
{
"volume": "309",
"volume-title": "CT-RSA 2013 (LNCS",
"author": "Liu Mingjie",
"key": "e_1_3_2_2_41_1"
},
{
"volume": "327",
"volume-title": "CHES'99 (LNCS",
"year": "1999",
"author": "L\u00f3pez-Hern\u00e1ndez Julio Cesar",
"key": "e_1_3_2_2_42_1"
},
{
"volume-title": "WISA 08 (LNCS",
"author": "Medwed Marcel",
"key": "e_1_3_2_2_43_1"
},
{
"volume-title": "TPM-FAIL: TPM meets Timing and Lattice Attacks. CoRR",
"year": "2019",
"author": "Moghimi Daniel",
"key": "e_1_3_2_2_45_1"
},
{
"volume-title": "Speeding the Pollard and elliptic curve methods of factorization. Mathematics of computation",
"year": "1987",
"author": "Montgomery Peter L.",
"key": "e_1_3_2_2_46_1"
},
{
"volume-title": "Nguyen and Mehdi Tibouchi",
"year": "2012",
"author": "Phong",
"key": "e_1_3_2_2_49_1"
},
{
"volume-title": "USENIX Security 2017 ,",
"author": "Garc'ia Cesar Pereida",
"key": "e_1_3_2_2_52_1"
},
{
"volume-title": "is my code constant time?",
"author": "Reparaz Oscar",
"key": "e_1_3_2_2_56_1"
},
{
"volume": "252",
"volume-title": "Efficient Identification and Signatures for Smart Cards. In CRYPTO'89 (LNCS",
"year": "1990",
"author": "Schnorr Claus-Peter",
"key": "e_1_3_2_2_60_1"
},
{
"volume": "173",
"volume-title": "CARDIS (Lecture Notes in Computer Science",
"year": "2016",
"author": "Susella Ruggero",
"key": "e_1_3_2_2_62_1"
},
{
"key": "e_1_3_2_2_63_1",
"unstructured": "Akira Takahashi and Mehdi Tibouchi. 2018. New Bleichenbacher Records: Parallel Implementation. https://github.com/security-kouza/new-bleichenbacher-records . Akira Takahashi and Mehdi Tibouchi. 2018. New Bleichenbacher Records: Parallel Implementation. https://github.com/security-kouza/new-bleichenbacher-records ."
},
{
"key": "e_1_3_2_2_65_1",
"unstructured": "The Sage Developers. YYYY. SageMath the Sage Mathematics Software System (Version x.y.z) . https://www.sagemath.org. The Sage Developers. YYYY. SageMath the Sage Mathematics Software System (Version x.y.z) . https://www.sagemath.org."
},
{
"volume-title": "Cryptanalysis of Block Ciphers Implemented on Computers with Cache. In International Symposium on Information Theory and Its Applications .",
"year": "2002",
"author": "Tsunoo Yukiyasu",
"key": "e_1_3_2_2_66_1"
},
{
"volume-title": "USENIX Security 2020)",
"author": "Weiser Samuel",
"key": "e_1_3_2_2_70_1"
},
{
"volume-title": "Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. In USENIX Security",
"year": "2020",
"author": "Yan Mengjia",
"key": "e_1_3_2_2_71_1"
},
{
"volume-title": "Mastik: A micro-architectural side-channel toolkit. Retrieved from School of Computer Science Adelaide: http://cs. adelaide. edu. au/yval/Mastik",
"year": "2016",
"author": "Yarom Yuval",
"key": "e_1_3_2_2_72_1"
},
{
"key": "e_1_3_2_2_73_1",
"unstructured": "Yuval Yarom and Katrina Falkner. 2014. FLUSH Yuval Yarom and Katrina Falkner. 2014. FLUSH"
},
{
"volume-title": "Low Noise, L3 Cache Side-Channel Attack. In USENIX Security",
"year": "2014",
"author": "RELOAD",
"key": "e_1_3_2_2_74_1"
}
]
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1834185241",
"name": "Jan Jancar"
},
{
"authorId": "153937464",
"name": "Vladimir Sedlacek"
},
{
"authorId": "1804733",
"name": "P. \u0160venda"
},
{
"authorId": "2456438",
"name": "Marek S\u00fds"
}
],
"doi": "10.13154/tches.v2020.i4.281-308",
"intent": [],
"isInfluential": false,
"paperId": "4d10e46e574e1c1e0fc06db8447e00990950cd3f",
"title": "Minerva: The curse of ECDSA nonces",
"url": "https://www.semanticscholar.org/paper/4d10e46e574e1c1e0fc06db8447e00990950cd3f",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2020
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "1911.05673",
"authors": [
{
"authorId": "118654372",
"name": "D. Moghimi"
},
{
"authorId": "1714383",
"name": "B. Sunar"
},
{
"authorId": "143719440",
"name": "T. Eisenbarth"
},
{
"authorId": "2842650",
"name": "N. Heninger"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "a8b972b9106686bcc115276aec3602ec54bea025",
"title": "TPM-FAIL: TPM meets Timing and Lattice Attacks",
"url": "https://www.semanticscholar.org/paper/a8b972b9106686bcc115276aec3602ec54bea025",
"venue": "USENIX Security Symposium",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "30512433",
"name": "Keegan Ryan"
}
],
"doi": "10.13154/tches.v2019.i1.146-168",
"intent": [],
"isInfluential": false,
"paperId": "f6ef2777eb666b466e05974dbca7cb342574e194",
"title": "Return of the Hidden Number Problem. A Widespread and Novel Key Extraction Attack on ECDSA and DSA",
"url": "https://www.semanticscholar.org/paper/f6ef2777eb666b466e05974dbca7cb342574e194",
"venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "144087378",
"name": "Akira Takahashi"
},
{
"authorId": "1678628",
"name": "Mehdi Tibouchi"
},
{
"authorId": "143972370",
"name": "Masayuki Abe"
}
],
"doi": "10.13154/tches.v2018.i3.331-371",
"intent": [],
"isInfluential": false,
"paperId": "4da8294cdfa37019eeef066a14d908238a910298",
"title": "New Bleichenbacher Records: Practical Fault Attacks on qDSA Signatures",
"url": "https://www.semanticscholar.org/paper/4da8294cdfa37019eeef066a14d908238a910298",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "1808.04761",
"authors": [
{
"authorId": "34596687",
"name": "Mengjia Yan"
},
{
"authorId": "2012099",
"name": "Christopher W. Fletcher"
},
{
"authorId": "1695950",
"name": "J. Torrellas"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "527b5265adc87cf59b778c0210dc776830706db8",
"title": "Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures",
"url": "https://www.semanticscholar.org/paper/527b5265adc87cf59b778c0210dc776830706db8",
"venue": "USENIX Security Symposium",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2589502",
"name": "Ben Gras"
},
{
"authorId": "2072347",
"name": "Kaveh Razavi"
},
{
"authorId": "144783720",
"name": "H. Bos"
},
{
"authorId": "1744275",
"name": "Cristiano Giuffrida"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "d9a8a841d3e8d2c33b663d6f87bd3f8ec48bee1e",
"title": "Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks",
"url": "https://www.semanticscholar.org/paper/d9a8a841d3e8d2c33b663d6f87bd3f8ec48bee1e",
"venue": "USENIX Security Symposium",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "46239371",
"name": "Fergus Dall"
},
{
"authorId": "46195008",
"name": "Gabrielle De Micheli"
},
{
"authorId": "143719440",
"name": "T. Eisenbarth"
},
{
"authorId": "2062558",
"name": "Daniel Genkin"
},
{
"authorId": "2842650",
"name": "N. Heninger"
},
{
"authorId": "25141461",
"name": "A. Moghimi"
},
{
"authorId": "49968838",
"name": "Y. Yarom"
}
],
"doi": "10.13154/tches.v2018.i2.171-191",
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "824906c89e86c42c3421b65bc2b9ee0cbca808f8",
"title": "CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks",
"url": "https://www.semanticscholar.org/paper/824906c89e86c42c3421b65bc2b9ee0cbca808f8",
"venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "1611.06952",
"authors": [
{
"authorId": "2144569283",
"name": "Sangho Lee"
},
{
"authorId": "34033392",
"name": "Ming-Wei Shih"
},
{
"authorId": "34696428",
"name": "Prasun Gera"
},
{
"authorId": "3254849",
"name": "Taesoo Kim"
},
{
"authorId": "8187053",
"name": "Hyesoon Kim"
},
{
"authorId": "143697538",
"name": "Marcus Peinado"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "e57c13e1be720b178408866499a06979f022207a",
"title": "Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing",
"url": "https://www.semanticscholar.org/paper/e57c13e1be720b178408866499a06979f022207a",
"venue": "USENIX Security Symposium",
"year": 2016
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2015792",
"name": "D. Gruss"
},
{
"authorId": "34701969",
"name": "Raphael Spreitzer"
},
{
"authorId": "1743786",
"name": "S. Mangard"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "70fb3cea8335aefdf849597e9d9dd7512d722d88",
"title": "Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches",
"url": "https://www.semanticscholar.org/paper/70fb3cea8335aefdf849597e9d9dd7512d722d88",
"venue": "USENIX Security Symposium",
"year": 2015
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "49968838",
"name": "Y. Yarom"
},
{
"authorId": "1679867",
"name": "K. Falkner"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "447611b97696bf363409371fa6ffb7befc36e5b7",
"title": "FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack",
"url": "https://www.semanticscholar.org/paper/447611b97696bf363409371fa6ffb7befc36e5b7",
"venue": "USENIX Security Symposium",
"year": 2014
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "0802.3570",
"authors": [
{
"authorId": "2067590211",
"name": "O. Ryan"
},
{
"authorId": "2065834880",
"name": "M. Debbah"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "f622bddb149c13f8a760ccb4eda00a8e947ad9cb",
"title": "Asymptotic Behaviour of Random Vandermonde Matrices with Entries on the Unit Circle",
"url": "https://www.semanticscholar.org/paper/f622bddb149c13f8a760ccb4eda00a8e947ad9cb",
"venue": "",
"year": 2008
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "36933248",
"name": "Samuel Weiser"
},
{
"authorId": "1887339531",
"name": "David Schrammel"
},
{
"authorId": "46195272",
"name": "L. Bodner"
},
{
"authorId": "34701969",
"name": "Raphael Spreitzer"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "f7f5f867fa72b680cfdf61ce3b8362a2d3fc2ed4",
"title": "Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations",
"url": "https://www.semanticscholar.org/paper/f7f5f867fa72b680cfdf61ce3b8362a2d3fc2ed4",
"venue": "USENIX Security Symposium",
"year": 2020
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1381506040",
"name": "Robert Merget"
},
{
"authorId": "1860743301",
"name": "Marcus Brinkmann"
},
{
"authorId": "3275883",
"name": "Nimrod Aviram"
},
{
"authorId": "1800162",
"name": "Juraj Somorovsky"
},
{
"authorId": "38890625",
"name": "Johannes Mittmann"
},
{
"authorId": "143816668",
"name": "J\u00f6rg Schwenk"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "dd24a27bc5149ab91a98a976e4b7be1c73c45c7e",
"title": "Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)",
"url": "https://www.semanticscholar.org/paper/dd24a27bc5149ab91a98a976e4b7be1c73c45c7e",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2020
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "",
"title": "New Bleichenbacher Records: Parallel Implementation. https://github.com/security-kouza/new-bleichenbacherrecords",
"url": "",
"venue": "",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "3413188",
"name": "Cesar Pereida Garc\u00eda"
},
{
"authorId": "2863384",
"name": "B. Brumley"
}
],
"doi": null,
"intent": [
"methodology",
"background"
],
"isInfluential": false,
"paperId": "0e9b9e095fed2df3762ee5bf00ec4f15001a3a7c",
"title": "Constant-Time Callees with Variable-Time Callers",
"url": "https://www.semanticscholar.org/paper/0e9b9e095fed2df3762ee5bf00ec4f15001a3a7c",
"venue": "USENIX Security Symposium",
"year": 2017
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "3364677",
"name": "L. G. Bruinderink"
},
{
"authorId": "2065868",
"name": "Andreas H\u00fclsing"
},
{
"authorId": "144337513",
"name": "T. Lange"
},
{
"authorId": "49968838",
"name": "Y. Yarom"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "bf6b19b03257bc71b39aff83ddce4b6fab1440e5",
"title": "Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme",
"url": "https://www.semanticscholar.org/paper/bf6b19b03257bc71b39aff83ddce4b6fab1440e5",
"venue": "",
"year": 2016
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "",
"title": "Mastik: A micro-architectural side-channel toolkit. Retrieved from School of Computer Science Adelaide: http://cs",
"url": "",
"venue": "adelaide. edu. au/yval/Mastik",
"year": 2016
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Experiments with DSA. Rump session at CRYPTO",
"url": "",
"venue": "",
"year": 2005
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1704716",
"name": "Y. Tsunoo"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "50972a401df35a2ce6a7eb0dc7a7c401a94a75bc",
"title": "Cryptanalysis of Block Ciphers Implemented on Computers with Cache",
"url": "https://www.semanticscholar.org/paper/50972a401df35a2ce6a7eb0dc7a7c401a94a75bc",
"venue": "",
"year": 2002
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "",
"title": "On the generation of one-time keys in DL signature schemes. Presentation at IEEE P1363 working group meeting",
"url": "",
"venue": "",
"year": 2000
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "0dada24bcee09e1f3d556ecf81f628ecaf4659d1",
"title": "2011 IEEE Symposium on Security and Privacy Cache Games \u2013 Bringing Access-Based Cache Attacks on AES to Practice",
"url": "https://www.semanticscholar.org/paper/0dada24bcee09e1f3d556ecf81f628ecaf4659d1",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "\u2022 Even < 1-bit leakage/signature is exploitable, albeit with quite a few signatures as input",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Smart proposed the lattice attack against HNP 2000 Bleichenbacher announced the Fourier analysis attack",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "RELIC is an Efficient LIbrary for Cryptography",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "\u2022 Don't underestimate even less than 1-bit of nonce leakage! \u2022 Interesting connection between the HNP and GBP (from symmetric key crypto)",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "References i",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "\u2022 Open question: Could #signatures for Bleichenbacher be as low as lattice? Thank you! & Questions?",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "\u2022 Open questions: \u2022 More list sum algorithms and tradeoffs? \u2022 Improvements to FFT computation? \u2022 Other sources of small leakage? Thank you! & Questions? More",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Boneh-Venkatesan defined the HNP",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "D\u00e9 j\u00e0 Vu attack on Mozilla's NSS; Raccoon attack on TLS 1.2 Still at the heart of many recent real-world vulnerabilities in ECDSA/Diffie-Hellman key exchange implementations!",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "\u2022 Securely implementing brittle cryptographic algorithms is still hard",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2407.16473",
"authors": [
{
"authorId": "2219057140",
"name": "Lulu Zhou"
},
{
"authorId": "2313153245",
"name": "Zeyu Liu"
},
{
"authorId": "2312393604",
"name": "Fan Zhang"
},
{
"authorId": "2312393854",
"name": "Michael K. Reiter"
}
],
"doi": "10.48550/arXiv.2407.16473",
"intent": [],
"isInfluential": false,
"paperId": "e39fcad8ce97f7f2b08b45385fc1b37d3120798d",
"title": "CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs",
"url": "https://www.semanticscholar.org/paper/e39fcad8ce97f7f2b08b45385fc1b37d3120798d",
"venue": "AFT",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2311.08027",
"authors": [
{
"authorId": "2266468969",
"name": "Puja Mondal"
},
{
"authorId": "2069231851",
"name": "Suparna Kundu"
},
{
"authorId": "2266465320",
"name": "Sarani Bhattacharya"
},
{
"authorId": "40249582",
"name": "A. Karmakar"
},
{
"authorId": "2243460775",
"name": "Ingrid Verbauwhede"
}
],
"doi": "10.48550/arXiv.2311.08027",
"intent": [
"background"
],
"isInfluential": false,
"paperId": "72e6ef07c22699b0761bb436a57c88c730566334",
"title": "A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer",
"url": "https://www.semanticscholar.org/paper/72e6ef07c22699b0761bb436a57c88c730566334",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2307.03979",
"authors": [
{
"authorId": "147392897",
"name": "M. Adamoudis"
},
{
"authorId": "2789333",
"name": "K. Draziotis"
},
{
"authorId": "3353228",
"name": "D. Poulakis"
}
],
"doi": "10.48550/arXiv.2307.03979",
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "419a04f8ef36bfd63253f49b319148a05584b0ef",
"title": "Attacking (EC)DSA scheme with ephemeral keys sharing specific bits",
"url": "https://www.semanticscholar.org/paper/419a04f8ef36bfd63253f49b319148a05584b0ef",
"venue": "ArXiv",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2301.08523",
"authors": [
{
"authorId": "2131861098",
"name": "Daji Landis"
},
{
"authorId": "1591462025",
"name": "N. I. Schwartzbach"
}
],
"doi": "10.48550/arXiv.2301.08523",
"intent": [
"background"
],
"isInfluential": false,
"paperId": "1ffc184c639992f278dd868d0ac4f382fd0141c7",
"title": "Side Contract Commitment Attacks on Blockchains",
"url": "https://www.semanticscholar.org/paper/1ffc184c639992f278dd868d0ac4f382fd0141c7",
"venue": "ArXiv",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2210.13124",
"authors": [
{
"authorId": "51230705",
"name": "Jan Wichelmann"
},
{
"authorId": "2183604016",
"name": "Anna P\u00e4tschke"
},
{
"authorId": "1651159426",
"name": "Luca Wilke"
},
{
"authorId": "143719440",
"name": "T. Eisenbarth"
}
],
"doi": "10.48550/arXiv.2210.13124",
"intent": [],
"isInfluential": false,
"paperId": "65f58616ad6391920b061f285c8dc41c13273801",
"title": "Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software",
"url": "https://www.semanticscholar.org/paper/65f58616ad6391920b061f285c8dc41c13273801",
"venue": "USENIX Security Symposium",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2101.01077",
"authors": [
{
"authorId": "8638444",
"name": "Alejandro Cabrera Aldaya"
},
{
"authorId": "2863384",
"name": "B. Brumley"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "18ff1afa13e527fffb0a4fb2cf04d9d0d1ab8e17",
"title": "HyperDegrade: From GHz to MHz Effective CPU Frequencies",
"url": "https://www.semanticscholar.org/paper/18ff1afa13e527fffb0a4fb2cf04d9d0d1ab8e17",
"venue": "USENIX Security Symposium",
"year": 2021
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2292349602",
"name": "Yiming Gao"
},
{
"authorId": "2292027993",
"name": "Jinghui Wang"
},
{
"authorId": "2292088923",
"name": "Honggang Hu"
},
{
"authorId": "2292257934",
"name": "Binang He"
}
],
"doi": null,
"intent": [
"methodology",
"background"
],
"isInfluential": true,
"paperId": "ee55ad9dda7f4f9b7749985b590dd7e9304c29c3",
"title": "Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks",
"url": "https://www.semanticscholar.org/paper/ee55ad9dda7f4f9b7749985b590dd7e9304c29c3",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2261119688",
"name": "Michele Orr\u00f9"
},
{
"authorId": "10175984",
"name": "George Kadianakis"
},
{
"authorId": "3476480",
"name": "Mary Maller"
},
{
"authorId": "2284922741",
"name": "Greg Zaverucha"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "4d64383aefc5e100491f8812a06c45192fef9412",
"title": "Beyond the circuit: How to Minimize Foreign Arithmetic in ZKP Circuits",
"url": "https://www.semanticscholar.org/paper/4d64383aefc5e100491f8812a06c45192fef9412",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2068041668",
"name": "Qi Feng"
},
{
"authorId": "2278403542",
"name": "Kang Yang"
},
{
"authorId": "2152981309",
"name": "Kaiyi Zhang"
},
{
"authorId": "2257243980",
"name": "Xiao Wang"
},
{
"authorId": "2258336813",
"name": "Yu Yu"
},
{
"authorId": "2256303510",
"name": "Xiang Xie"
},
{
"authorId": "2261406026",
"name": "Debiao He"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "2cea4817b8b6a07b244b8a779bf7a09e7b32f4a7",
"title": "Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication",
"url": "https://www.semanticscholar.org/paper/2cea4817b8b6a07b244b8a779bf7a09e7b32f4a7",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2265761550",
"name": "Santiago Arranz Olmos"
},
{
"authorId": "2257231143",
"name": "Gilles Barthe"
},
{
"authorId": "2313626348",
"name": "Lionel Blatter"
},
{
"authorId": "2257291250",
"name": "Benjamin Gr\u00e9goire"
},
{
"authorId": "2101651378",
"name": "Vincent Laporte"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "5e10a949ce1452db2cc065985bc7f3006bee8990",
"title": "Preservation of Speculative Constant-time by Compilation",
"url": "https://www.semanticscholar.org/paper/5e10a949ce1452db2cc065985bc7f3006bee8990",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2312400286",
"name": "Ping-Lun Wang"
},
{
"authorId": "2312307168",
"name": "Riccardo Paccagnella"
},
{
"authorId": "3031766",
"name": "R. Wahby"
},
{
"authorId": "2312308561",
"name": "Fraser Brown"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "ef5f7a27c699fc3532b911cd4753f8c73094f2a4",
"title": "Bending microarchitectural weird machines towards practicality",
"url": "https://www.semanticscholar.org/paper/ef5f7a27c699fc3532b911cd4753f8c73094f2a4",
"venue": "USENIX Security Symposium",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2116887499",
"name": "Yao Sun"
},
{
"authorId": "2226098544",
"name": "Shuai Chang"
}
],
"doi": null,
"intent": [
"methodology",
"background"
],
"isInfluential": false,
"paperId": "715a0bc4ce437a631e5a87f8d2696ae9faec11d8",
"title": "A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic",
"url": "https://www.semanticscholar.org/paper/715a0bc4ce437a631e5a87f8d2696ae9faec11d8",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1808007",
"name": "Marco Macchetti"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "1613c09f3af3bd4a11acc953af526cc60b9c67b1",
"title": "A Novel Related Nonce Attack for ECDSA",
"url": "https://www.semanticscholar.org/paper/1613c09f3af3bd4a11acc953af526cc60b9c67b1",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2093030221",
"name": "J. Surin"
},
{
"authorId": "39974279",
"name": "Shaanan N. Cohney"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "00dfd1e56cac94e47009accc5cec4ea9f9cf84b0",
"title": "A Gentle Tutorial for Lattice-Based Cryptanalysis",
"url": "https://www.semanticscholar.org/paper/00dfd1e56cac94e47009accc5cec4ea9f9cf84b0",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2190045087",
"name": "Sen Deng"
},
{
"authorId": "2145711629",
"name": "Mengyuan Li"
},
{
"authorId": "2115421125",
"name": "Yining Tang"
},
{
"authorId": "2230913662",
"name": "Shuai Wang"
},
{
"authorId": "2107708991",
"name": "S. Yan"
},
{
"authorId": "39939156",
"name": "Yinqian Zhang"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "42949f11691add1d6ad161c5d05054673ee901bb",
"title": "CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations",
"url": "https://www.semanticscholar.org/paper/42949f11691add1d6ad161c5d05054673ee901bb",
"venue": "USENIX Security Symposium",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": null,
"name": "Zirui Neil Zhao"
},
{
"authorId": "143628061",
"name": "Adam Morrison"
},
{
"authorId": "2012099",
"name": "Christopher W. Fletcher"
},
{
"authorId": "1695950",
"name": "J. Torrellas"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": true,
"paperId": "f2e659860930d57b0424f18835fa8df92fe5921c",
"title": "Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker",
"url": "https://www.semanticscholar.org/paper/f2e659860930d57b0424f18835fa8df92fe5921c",
"venue": "USENIX Security Symposium",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "144713424",
"name": "Melissa Chase"
},
{
"authorId": "40535555",
"name": "Michele Orr\u00f9"
},
{
"authorId": "34998734",
"name": "Trevor Perrin"
},
{
"authorId": "48298655",
"name": "Greg Zaverucha"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "55cc5ae7aaa7d5beb90a8f3c9943000e529f6812",
"title": "Proofs of discrete logarithm equality across groups",
"url": "https://www.semanticscholar.org/paper/55cc5ae7aaa7d5beb90a8f3c9943000e529f6812",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1806514",
"name": "G. Barbu"
},
{
"authorId": "10380476",
"name": "Ward Beullens"
},
{
"authorId": "1735780",
"name": "Emmanuelle Dottax"
},
{
"authorId": "34734574",
"name": "Christophe Giraud"
},
{
"authorId": "2135848255",
"name": "Agathe Houzelot"
},
{
"authorId": "2588977",
"name": "Chaoyun Li"
},
{
"authorId": "2675135",
"name": "M. Mahzoun"
},
{
"authorId": "26357633",
"name": "Adri\u00e1n Ranea"
},
{
"authorId": "2153624000",
"name": "Jianrui Xie"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "163edbb574589973131d03f5d0b54db63aa58be1",
"title": "ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest",
"url": "https://www.semanticscholar.org/paper/163edbb574589973131d03f5d0b54db63aa58be1",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2172535749",
"name": "Miles Dai"
},
{
"authorId": "153098244",
"name": "Riccardo Paccagnella"
},
{
"authorId": "2172708549",
"name": "Miguel Gomez-Garcia"
},
{
"authorId": "2304005",
"name": "John D. McCalpin"
},
{
"authorId": "34596687",
"name": "Mengjia Yan"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "e876cd58c4fc0a7b1a5c96bb0e3bebc2e8339bcb",
"title": "Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects",
"url": "https://www.semanticscholar.org/paper/e876cd58c4fc0a7b1a5c96bb0e3bebc2e8339bcb",
"venue": "USENIX Security Symposium",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2115739243",
"name": "Kotaro Abe"
},
{
"authorId": "144952437",
"name": "M. Ikeda"
}
],
"doi": null,
"intent": [
"methodology",
"background"
],
"isInfluential": true,
"paperId": "e30f7bbb70e1639f8caa5963390c8e5628b53ed7",
"title": "Estimating the Effectiveness of Lattice Attacks",
"url": "https://www.semanticscholar.org/paper/e30f7bbb70e1639f8caa5963390c8e5628b53ed7",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2021
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1703487",
"name": "S. Krenn"
},
{
"authorId": "40535555",
"name": "Michele Orr\u00f9"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "6154ffde9cac0b7c391ac62b3829892751bb8063",
"title": "Proposal: \u03a3 -protocols",
"url": "https://www.semanticscholar.org/paper/6154ffde9cac0b7c391ac62b3829892751bb8063",
"venue": "",
"year": 2021
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1491077893",
"name": "Haopeng Fan"
},
{
"authorId": "6152731",
"name": "Wenhao Wang"
},
{
"authorId": "49417914",
"name": "Yongjuan Wang"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "e6bf92297575cbcf7a8ccd7527176227279af2a5",
"title": "Cache attack on MISTY1",
"url": "https://www.semanticscholar.org/paper/e6bf92297575cbcf7a8ccd7527176227279af2a5",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2021
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "143962759",
"name": "S. Galbraith"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "348433282315508769a65c221e44c44aebe0e5e8",
"title": "CRYPTREC Review of EdDSA",
"url": "https://www.semanticscholar.org/paper/348433282315508769a65c221e44c44aebe0e5e8",
"venue": "",
"year": 2020
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1393519076",
"name": "Amber Sprenkels"
},
{
"authorId": "3149910",
"name": "B. Westerbaan"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "49883e051e235ee6cf4a751e2ebe5aa481d74c5c",
"title": "Don't throw your nonces out with the bathwater",
"url": "https://www.semanticscholar.org/paper/49883e051e235ee6cf4a751e2ebe5aa481d74c5c",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2020
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "51230705",
"name": "Jan Wichelmann"
},
{
"authorId": "2183604016",
"name": "Anna P\u00e4tschke"
},
{
"authorId": "1651159426",
"name": "Luca Wilke"
},
{
"authorId": "143719440",
"name": "T. Eisenbarth"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "9e2e7c55a40397f6bf9b72750e1cff3c19b2b0df",
"title": "This paper is included",
"url": "https://www.semanticscholar.org/paper/9e2e7c55a40397f6bf9b72750e1cff3c19b2b0df",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "10665146",
"name": "Ingab Kang"
},
{
"authorId": "2260924416",
"name": "Walter Wang"
},
{
"authorId": "2261061594",
"name": "Jason Kim"
},
{
"authorId": "11018609",
"name": "S. V. Schaik"
},
{
"authorId": "30739562",
"name": "Y. Tobah"
},
{
"authorId": "2295580685",
"name": "Daniel Genkin"
},
{
"authorId": "2064221824",
"name": "Andrew Kwong"
},
{
"authorId": "49968838",
"name": "Y. Yarom"
}
],
"doi": null,
"intent": [
"background",
"result"
],
"isInfluential": false,
"paperId": "296d58f6ac0ca2b2eab4b1237876cfbf070edd9c",
"title": "This paper is included in the Proceedings of the 33rd USENIX Security Symposium.",
"url": "https://www.semanticscholar.org/paper/296d58f6ac0ca2b2eab4b1237876cfbf070edd9c",
"venue": "",
"year": null
}
WDYT? Is this publication in scope?
URL: http://dx.doi.org/10.1145/3372297.3417268 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1145/3372297.3417268