aewag / physical-attack-collection

0 stars 0 forks source link

Aranha_2020 #1763

Open aewag opened 6 days ago

aewag commented 6 days ago

WDYT? Is this publication in scope?

@inproceedings{Aranha_2020,
 author = {Aranha, Diego F. and Novaes, Felipe Rodrigues and Takahashi, Akira and Tibouchi, Mehdi and Yarom, Yuval},
 booktitle = {Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security},
 collection = {CCS ’20},
 doi = {10.1145/3372297.3417268},
 month = {October},
 pages = {225–242},
 publisher = {ACM},
 series = {CCS ’20},
 title = {LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage},
 url = {http://dx.doi.org/10.1145/3372297.3417268},
 year = {2020}
}

URL: http://dx.doi.org/10.1145/3372297.3417268 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1145/3372297.3417268

aewag commented 5 days ago

Yes

aewag commented 5 days ago

I didnot find DOIs for the following references:

[
    {
        "volume": "124",
        "volume-title": "New Results on Instruction Cache Attacks. In CHES 2010 (LNCS",
        "year": "2010",
        "author": "Onur Aciic",
        "key": "e_1_3_2_2_1_1"
    },
    {
        "volume": "203",
        "volume-title": "New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. In 11th IMA International Conference on Cryptography and Coding (LNCS",
        "year": "2007",
        "author": "Onur Aciic",
        "key": "e_1_3_2_2_2_1"
    },
    {
        "volume-title": "Cheap Hardware Parallelism Implies Cheap Security. In Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography",
        "author": "Onur",
        "key": "e_1_3_2_2_3_1"
    },
    {
        "volume-title": "Katrina E. Falkner, Joop van de Pol, and Yuval Yarom.",
        "year": "2016",
        "author": "Allan Thomas",
        "key": "e_1_3_2_2_4_1"
    },
    {
        "key": "e_1_3_2_2_5_1",
        "unstructured": "D. F. Aranha etalmbox. [n.d.]. RELIC is an Efficient LIbrary for Cryptography . https://github.com/relic-toolkit/relic .  D. F. Aranha et almbox. [n.d.]. RELIC is an Efficient LIbrary for Cryptography . https://github.com/relic-toolkit/relic ."
    },
    {
        "volume": "385",
        "volume-title": "Improved Generic Algorithms for Hard Knapsacks. In EUROCRYPT 2011 (LNCS",
        "year": "2011",
        "author": "Becker Anja",
        "key": "e_1_3_2_2_7_1"
    },
    {
        "volume": "92",
        "volume-title": "Long Way. In CHES 2014 (LNCS",
        "author": "Benger Naomi",
        "key": "e_1_3_2_2_9_1"
    },
    {
        "volume": "50",
        "volume-title": "Faster Addition and Doubling on Elliptic Curves. In ASIACRYPT 2007 (LNCS",
        "author": "Daniel",
        "key": "e_1_3_2_2_12_1"
    },
    {
        "key": "e_1_3_2_2_13_1",
        "unstructured": "Daniel Bleichenbacher. 2000. On the generation of one-time keys in DL signature schemes. Presentation at IEEE P1363 working group meeting.  Daniel Bleichenbacher. 2000. On the generation of one-time keys in DL signature schemes. Presentation at IEEE P1363 working group meeting."
    },
    {
        "volume-title": "Experiments with DSA . Rump session at CRYPTO",
        "year": "2005",
        "author": "Bleichenbacher Daniel",
        "key": "e_1_3_2_2_14_1"
    },
    {
        "volume": "142",
        "volume-title": "Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. In CRYPTO'96 (LNCS",
        "year": "1996",
        "author": "Boneh Dan",
        "key": "e_1_3_2_2_15_1"
    },
    {
        "volume": "371",
        "volume-title": "Remote Timing Attacks Are Still Practical. In ESORICS 2011 (LNCS",
        "year": "2011",
        "author": "Brumley Billy Bob",
        "key": "e_1_3_2_2_17_1"
    },
    {
        "volume-title": "Port Contention for Fun and Profit. In 2019 IEEE Symposium on Security and Privacy . IEEE Computer Society Press, 870--887",
        "year": "2019",
        "author": "Aldaya Alejandro Cabrera",
        "key": "e_1_3_2_2_18_1"
    },
    {
        "volume-title": "Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, and Yuval Yarom.",
        "year": "2018",
        "author": "Dall Fergus",
        "key": "e_1_3_2_2_22_1"
    },
    {
        "volume": "452",
        "volume-title": "CHES 2013 (LNCS",
        "year": "2013",
        "author": "Mulder Elke De",
        "key": "e_1_3_2_2_23_1"
    },
    {
        "key": "e_1_3_2_2_26_1",
        "first-page": "2",
        "article-title": "High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers",
        "volume": "77",
        "author": "Michael D\u00fc",
        "year": "2015",
        "journal-title": "Des. Codes Cryptogr."
    },
    {
        "volume-title": "C\u00e9 dric Murdica, and David Naccache",
        "year": "2016",
        "author": "Fouque Pierre-Alain",
        "key": "e_1_3_2_2_27_1"
    },
    {
        "volume-title": "USENIX Security 2018 ,",
        "author": "Gras Ben",
        "key": "e_1_3_2_2_31_1"
    },
    {
        "volume-title": "USENIX Security",
        "year": "2015",
        "author": "Gruss Daniel",
        "key": "e_1_3_2_2_33_1"
    },
    {
        "volume": "256",
        "volume-title": "New Generic Algorithms for Hard Knapsacks. In EUROCRYPT 2010 (LNCS",
        "year": "2010",
        "author": "Howgrave-Graham Nick",
        "key": "e_1_3_2_2_35_1"
    },
    {
        "volume-title": "Thomas Eisenbarth, and Berk Sunar.",
        "year": "2014",
        "author": "Apecechea Gorka Irazoqui",
        "key": "e_1_3_2_2_37_1"
    },
    {
        "volume-title": "USENIX Security",
        "year": "2017",
        "author": "Lee Sangho",
        "key": "e_1_3_2_2_39_1"
    },
    {
        "volume": "309",
        "volume-title": "CT-RSA 2013 (LNCS",
        "author": "Liu Mingjie",
        "key": "e_1_3_2_2_41_1"
    },
    {
        "volume": "327",
        "volume-title": "CHES'99 (LNCS",
        "year": "1999",
        "author": "L\u00f3pez-Hern\u00e1ndez Julio Cesar",
        "key": "e_1_3_2_2_42_1"
    },
    {
        "volume-title": "WISA 08 (LNCS",
        "author": "Medwed Marcel",
        "key": "e_1_3_2_2_43_1"
    },
    {
        "volume-title": "TPM-FAIL: TPM meets Timing and Lattice Attacks. CoRR",
        "year": "2019",
        "author": "Moghimi Daniel",
        "key": "e_1_3_2_2_45_1"
    },
    {
        "volume-title": "Speeding the Pollard and elliptic curve methods of factorization. Mathematics of computation",
        "year": "1987",
        "author": "Montgomery Peter L.",
        "key": "e_1_3_2_2_46_1"
    },
    {
        "volume-title": "Nguyen and Mehdi Tibouchi",
        "year": "2012",
        "author": "Phong",
        "key": "e_1_3_2_2_49_1"
    },
    {
        "volume-title": "USENIX Security 2017 ,",
        "author": "Garc'ia Cesar Pereida",
        "key": "e_1_3_2_2_52_1"
    },
    {
        "volume-title": "is my code constant time?",
        "author": "Reparaz Oscar",
        "key": "e_1_3_2_2_56_1"
    },
    {
        "volume": "252",
        "volume-title": "Efficient Identification and Signatures for Smart Cards. In CRYPTO'89 (LNCS",
        "year": "1990",
        "author": "Schnorr Claus-Peter",
        "key": "e_1_3_2_2_60_1"
    },
    {
        "volume": "173",
        "volume-title": "CARDIS (Lecture Notes in Computer Science",
        "year": "2016",
        "author": "Susella Ruggero",
        "key": "e_1_3_2_2_62_1"
    },
    {
        "key": "e_1_3_2_2_63_1",
        "unstructured": "Akira Takahashi and Mehdi Tibouchi. 2018. New Bleichenbacher Records: Parallel Implementation. https://github.com/security-kouza/new-bleichenbacher-records .  Akira Takahashi and Mehdi Tibouchi. 2018. New Bleichenbacher Records: Parallel Implementation. https://github.com/security-kouza/new-bleichenbacher-records ."
    },
    {
        "key": "e_1_3_2_2_65_1",
        "unstructured": "The Sage Developers. YYYY. SageMath the Sage Mathematics Software System (Version x.y.z) . https://www.sagemath.org.  The Sage Developers. YYYY. SageMath the Sage Mathematics Software System (Version x.y.z) . https://www.sagemath.org."
    },
    {
        "volume-title": "Cryptanalysis of Block Ciphers Implemented on Computers with Cache. In International Symposium on Information Theory and Its Applications .",
        "year": "2002",
        "author": "Tsunoo Yukiyasu",
        "key": "e_1_3_2_2_66_1"
    },
    {
        "volume-title": "USENIX Security 2020)",
        "author": "Weiser Samuel",
        "key": "e_1_3_2_2_70_1"
    },
    {
        "volume-title": "Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. In USENIX Security",
        "year": "2020",
        "author": "Yan Mengjia",
        "key": "e_1_3_2_2_71_1"
    },
    {
        "volume-title": "Mastik: A micro-architectural side-channel toolkit. Retrieved from School of Computer Science Adelaide: http://cs. adelaide. edu. au/yval/Mastik",
        "year": "2016",
        "author": "Yarom Yuval",
        "key": "e_1_3_2_2_72_1"
    },
    {
        "key": "e_1_3_2_2_73_1",
        "unstructured": "Yuval Yarom and Katrina Falkner. 2014. FLUSH  Yuval Yarom and Katrina Falkner. 2014. FLUSH"
    },
    {
        "volume-title": "Low Noise, L3 Cache Side-Channel Attack. In USENIX Security",
        "year": "2014",
        "author": "RELOAD",
        "key": "e_1_3_2_2_74_1"
    }
]

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1834185241",
            "name": "Jan Jancar"
        },
        {
            "authorId": "153937464",
            "name": "Vladimir Sedlacek"
        },
        {
            "authorId": "1804733",
            "name": "P. \u0160venda"
        },
        {
            "authorId": "2456438",
            "name": "Marek S\u00fds"
        }
    ],
    "doi": "10.13154/tches.v2020.i4.281-308",
    "intent": [],
    "isInfluential": false,
    "paperId": "4d10e46e574e1c1e0fc06db8447e00990950cd3f",
    "title": "Minerva: The curse of ECDSA nonces",
    "url": "https://www.semanticscholar.org/paper/4d10e46e574e1c1e0fc06db8447e00990950cd3f",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2020
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "1911.05673",
    "authors": [
        {
            "authorId": "118654372",
            "name": "D. Moghimi"
        },
        {
            "authorId": "1714383",
            "name": "B. Sunar"
        },
        {
            "authorId": "143719440",
            "name": "T. Eisenbarth"
        },
        {
            "authorId": "2842650",
            "name": "N. Heninger"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "a8b972b9106686bcc115276aec3602ec54bea025",
    "title": "TPM-FAIL: TPM meets Timing and Lattice Attacks",
    "url": "https://www.semanticscholar.org/paper/a8b972b9106686bcc115276aec3602ec54bea025",
    "venue": "USENIX Security Symposium",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "30512433",
            "name": "Keegan Ryan"
        }
    ],
    "doi": "10.13154/tches.v2019.i1.146-168",
    "intent": [],
    "isInfluential": false,
    "paperId": "f6ef2777eb666b466e05974dbca7cb342574e194",
    "title": "Return of the Hidden Number Problem. A Widespread and Novel Key Extraction Attack on ECDSA and DSA",
    "url": "https://www.semanticscholar.org/paper/f6ef2777eb666b466e05974dbca7cb342574e194",
    "venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "144087378",
            "name": "Akira Takahashi"
        },
        {
            "authorId": "1678628",
            "name": "Mehdi Tibouchi"
        },
        {
            "authorId": "143972370",
            "name": "Masayuki Abe"
        }
    ],
    "doi": "10.13154/tches.v2018.i3.331-371",
    "intent": [],
    "isInfluential": false,
    "paperId": "4da8294cdfa37019eeef066a14d908238a910298",
    "title": "New Bleichenbacher Records: Practical Fault Attacks on qDSA Signatures",
    "url": "https://www.semanticscholar.org/paper/4da8294cdfa37019eeef066a14d908238a910298",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "1808.04761",
    "authors": [
        {
            "authorId": "34596687",
            "name": "Mengjia Yan"
        },
        {
            "authorId": "2012099",
            "name": "Christopher W. Fletcher"
        },
        {
            "authorId": "1695950",
            "name": "J. Torrellas"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "527b5265adc87cf59b778c0210dc776830706db8",
    "title": "Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures",
    "url": "https://www.semanticscholar.org/paper/527b5265adc87cf59b778c0210dc776830706db8",
    "venue": "USENIX Security Symposium",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2589502",
            "name": "Ben Gras"
        },
        {
            "authorId": "2072347",
            "name": "Kaveh Razavi"
        },
        {
            "authorId": "144783720",
            "name": "H. Bos"
        },
        {
            "authorId": "1744275",
            "name": "Cristiano Giuffrida"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "d9a8a841d3e8d2c33b663d6f87bd3f8ec48bee1e",
    "title": "Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks",
    "url": "https://www.semanticscholar.org/paper/d9a8a841d3e8d2c33b663d6f87bd3f8ec48bee1e",
    "venue": "USENIX Security Symposium",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "46239371",
            "name": "Fergus Dall"
        },
        {
            "authorId": "46195008",
            "name": "Gabrielle De Micheli"
        },
        {
            "authorId": "143719440",
            "name": "T. Eisenbarth"
        },
        {
            "authorId": "2062558",
            "name": "Daniel Genkin"
        },
        {
            "authorId": "2842650",
            "name": "N. Heninger"
        },
        {
            "authorId": "25141461",
            "name": "A. Moghimi"
        },
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        }
    ],
    "doi": "10.13154/tches.v2018.i2.171-191",
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "824906c89e86c42c3421b65bc2b9ee0cbca808f8",
    "title": "CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks",
    "url": "https://www.semanticscholar.org/paper/824906c89e86c42c3421b65bc2b9ee0cbca808f8",
    "venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "1611.06952",
    "authors": [
        {
            "authorId": "2144569283",
            "name": "Sangho Lee"
        },
        {
            "authorId": "34033392",
            "name": "Ming-Wei Shih"
        },
        {
            "authorId": "34696428",
            "name": "Prasun Gera"
        },
        {
            "authorId": "3254849",
            "name": "Taesoo Kim"
        },
        {
            "authorId": "8187053",
            "name": "Hyesoon Kim"
        },
        {
            "authorId": "143697538",
            "name": "Marcus Peinado"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "e57c13e1be720b178408866499a06979f022207a",
    "title": "Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing",
    "url": "https://www.semanticscholar.org/paper/e57c13e1be720b178408866499a06979f022207a",
    "venue": "USENIX Security Symposium",
    "year": 2016
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2015792",
            "name": "D. Gruss"
        },
        {
            "authorId": "34701969",
            "name": "Raphael Spreitzer"
        },
        {
            "authorId": "1743786",
            "name": "S. Mangard"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "70fb3cea8335aefdf849597e9d9dd7512d722d88",
    "title": "Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches",
    "url": "https://www.semanticscholar.org/paper/70fb3cea8335aefdf849597e9d9dd7512d722d88",
    "venue": "USENIX Security Symposium",
    "year": 2015
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        },
        {
            "authorId": "1679867",
            "name": "K. Falkner"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "447611b97696bf363409371fa6ffb7befc36e5b7",
    "title": "FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack",
    "url": "https://www.semanticscholar.org/paper/447611b97696bf363409371fa6ffb7befc36e5b7",
    "venue": "USENIX Security Symposium",
    "year": 2014
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "0802.3570",
    "authors": [
        {
            "authorId": "2067590211",
            "name": "O. Ryan"
        },
        {
            "authorId": "2065834880",
            "name": "M. Debbah"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "f622bddb149c13f8a760ccb4eda00a8e947ad9cb",
    "title": "Asymptotic Behaviour of Random Vandermonde Matrices with Entries on the Unit Circle",
    "url": "https://www.semanticscholar.org/paper/f622bddb149c13f8a760ccb4eda00a8e947ad9cb",
    "venue": "",
    "year": 2008
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "36933248",
            "name": "Samuel Weiser"
        },
        {
            "authorId": "1887339531",
            "name": "David Schrammel"
        },
        {
            "authorId": "46195272",
            "name": "L. Bodner"
        },
        {
            "authorId": "34701969",
            "name": "Raphael Spreitzer"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "f7f5f867fa72b680cfdf61ce3b8362a2d3fc2ed4",
    "title": "Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations",
    "url": "https://www.semanticscholar.org/paper/f7f5f867fa72b680cfdf61ce3b8362a2d3fc2ed4",
    "venue": "USENIX Security Symposium",
    "year": 2020
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1381506040",
            "name": "Robert Merget"
        },
        {
            "authorId": "1860743301",
            "name": "Marcus Brinkmann"
        },
        {
            "authorId": "3275883",
            "name": "Nimrod Aviram"
        },
        {
            "authorId": "1800162",
            "name": "Juraj Somorovsky"
        },
        {
            "authorId": "38890625",
            "name": "Johannes Mittmann"
        },
        {
            "authorId": "143816668",
            "name": "J\u00f6rg Schwenk"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "dd24a27bc5149ab91a98a976e4b7be1c73c45c7e",
    "title": "Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)",
    "url": "https://www.semanticscholar.org/paper/dd24a27bc5149ab91a98a976e4b7be1c73c45c7e",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2020
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "",
    "title": "New Bleichenbacher Records: Parallel Implementation. https://github.com/security-kouza/new-bleichenbacherrecords",
    "url": "",
    "venue": "",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "3413188",
            "name": "Cesar Pereida Garc\u00eda"
        },
        {
            "authorId": "2863384",
            "name": "B. Brumley"
        }
    ],
    "doi": null,
    "intent": [
        "methodology",
        "background"
    ],
    "isInfluential": false,
    "paperId": "0e9b9e095fed2df3762ee5bf00ec4f15001a3a7c",
    "title": "Constant-Time Callees with Variable-Time Callers",
    "url": "https://www.semanticscholar.org/paper/0e9b9e095fed2df3762ee5bf00ec4f15001a3a7c",
    "venue": "USENIX Security Symposium",
    "year": 2017
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "3364677",
            "name": "L. G. Bruinderink"
        },
        {
            "authorId": "2065868",
            "name": "Andreas H\u00fclsing"
        },
        {
            "authorId": "144337513",
            "name": "T. Lange"
        },
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "bf6b19b03257bc71b39aff83ddce4b6fab1440e5",
    "title": "Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme",
    "url": "https://www.semanticscholar.org/paper/bf6b19b03257bc71b39aff83ddce4b6fab1440e5",
    "venue": "",
    "year": 2016
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "",
    "title": "Mastik: A micro-architectural side-channel toolkit. Retrieved from School of Computer Science Adelaide: http://cs",
    "url": "",
    "venue": "adelaide. edu. au/yval/Mastik",
    "year": 2016
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Experiments with DSA. Rump session at CRYPTO",
    "url": "",
    "venue": "",
    "year": 2005
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1704716",
            "name": "Y. Tsunoo"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "50972a401df35a2ce6a7eb0dc7a7c401a94a75bc",
    "title": "Cryptanalysis of Block Ciphers Implemented on Computers with Cache",
    "url": "https://www.semanticscholar.org/paper/50972a401df35a2ce6a7eb0dc7a7c401a94a75bc",
    "venue": "",
    "year": 2002
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "",
    "title": "On the generation of one-time keys in DL signature schemes. Presentation at IEEE P1363 working group meeting",
    "url": "",
    "venue": "",
    "year": 2000
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "0dada24bcee09e1f3d556ecf81f628ecaf4659d1",
    "title": "2011 IEEE Symposium on Security and Privacy Cache Games \u2013 Bringing Access-Based Cache Attacks on AES to Practice",
    "url": "https://www.semanticscholar.org/paper/0dada24bcee09e1f3d556ecf81f628ecaf4659d1",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "\u2022 Even < 1-bit leakage/signature is exploitable, albeit with quite a few signatures as input",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Smart proposed the lattice attack against HNP 2000 Bleichenbacher announced the Fourier analysis attack",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "RELIC is an Efficient LIbrary for Cryptography",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "\u2022 Don't underestimate even less than 1-bit of nonce leakage! \u2022 Interesting connection between the HNP and GBP (from symmetric key crypto)",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "References i",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "\u2022 Open question: Could #signatures for Bleichenbacher be as low as lattice? Thank you! & Questions?",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "\u2022 Open questions: \u2022 More list sum algorithms and tradeoffs? \u2022 Improvements to FFT computation? \u2022 Other sources of small leakage? Thank you! & Questions? More",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Boneh-Venkatesan defined the HNP",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "D\u00e9 j\u00e0 Vu attack on Mozilla's NSS; Raccoon attack on TLS 1.2 Still at the heart of many recent real-world vulnerabilities in ECDSA/Diffie-Hellman key exchange implementations!",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "\u2022 Securely implementing brittle cryptographic algorithms is still hard",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2407.16473",
    "authors": [
        {
            "authorId": "2219057140",
            "name": "Lulu Zhou"
        },
        {
            "authorId": "2313153245",
            "name": "Zeyu Liu"
        },
        {
            "authorId": "2312393604",
            "name": "Fan Zhang"
        },
        {
            "authorId": "2312393854",
            "name": "Michael K. Reiter"
        }
    ],
    "doi": "10.48550/arXiv.2407.16473",
    "intent": [],
    "isInfluential": false,
    "paperId": "e39fcad8ce97f7f2b08b45385fc1b37d3120798d",
    "title": "CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs",
    "url": "https://www.semanticscholar.org/paper/e39fcad8ce97f7f2b08b45385fc1b37d3120798d",
    "venue": "AFT",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2311.08027",
    "authors": [
        {
            "authorId": "2266468969",
            "name": "Puja Mondal"
        },
        {
            "authorId": "2069231851",
            "name": "Suparna Kundu"
        },
        {
            "authorId": "2266465320",
            "name": "Sarani Bhattacharya"
        },
        {
            "authorId": "40249582",
            "name": "A. Karmakar"
        },
        {
            "authorId": "2243460775",
            "name": "Ingrid Verbauwhede"
        }
    ],
    "doi": "10.48550/arXiv.2311.08027",
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "72e6ef07c22699b0761bb436a57c88c730566334",
    "title": "A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer",
    "url": "https://www.semanticscholar.org/paper/72e6ef07c22699b0761bb436a57c88c730566334",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2307.03979",
    "authors": [
        {
            "authorId": "147392897",
            "name": "M. Adamoudis"
        },
        {
            "authorId": "2789333",
            "name": "K. Draziotis"
        },
        {
            "authorId": "3353228",
            "name": "D. Poulakis"
        }
    ],
    "doi": "10.48550/arXiv.2307.03979",
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "419a04f8ef36bfd63253f49b319148a05584b0ef",
    "title": "Attacking (EC)DSA scheme with ephemeral keys sharing specific bits",
    "url": "https://www.semanticscholar.org/paper/419a04f8ef36bfd63253f49b319148a05584b0ef",
    "venue": "ArXiv",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2301.08523",
    "authors": [
        {
            "authorId": "2131861098",
            "name": "Daji Landis"
        },
        {
            "authorId": "1591462025",
            "name": "N. I. Schwartzbach"
        }
    ],
    "doi": "10.48550/arXiv.2301.08523",
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "1ffc184c639992f278dd868d0ac4f382fd0141c7",
    "title": "Side Contract Commitment Attacks on Blockchains",
    "url": "https://www.semanticscholar.org/paper/1ffc184c639992f278dd868d0ac4f382fd0141c7",
    "venue": "ArXiv",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2210.13124",
    "authors": [
        {
            "authorId": "51230705",
            "name": "Jan Wichelmann"
        },
        {
            "authorId": "2183604016",
            "name": "Anna P\u00e4tschke"
        },
        {
            "authorId": "1651159426",
            "name": "Luca Wilke"
        },
        {
            "authorId": "143719440",
            "name": "T. Eisenbarth"
        }
    ],
    "doi": "10.48550/arXiv.2210.13124",
    "intent": [],
    "isInfluential": false,
    "paperId": "65f58616ad6391920b061f285c8dc41c13273801",
    "title": "Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software",
    "url": "https://www.semanticscholar.org/paper/65f58616ad6391920b061f285c8dc41c13273801",
    "venue": "USENIX Security Symposium",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2101.01077",
    "authors": [
        {
            "authorId": "8638444",
            "name": "Alejandro Cabrera Aldaya"
        },
        {
            "authorId": "2863384",
            "name": "B. Brumley"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "18ff1afa13e527fffb0a4fb2cf04d9d0d1ab8e17",
    "title": "HyperDegrade: From GHz to MHz Effective CPU Frequencies",
    "url": "https://www.semanticscholar.org/paper/18ff1afa13e527fffb0a4fb2cf04d9d0d1ab8e17",
    "venue": "USENIX Security Symposium",
    "year": 2021
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2292349602",
            "name": "Yiming Gao"
        },
        {
            "authorId": "2292027993",
            "name": "Jinghui Wang"
        },
        {
            "authorId": "2292088923",
            "name": "Honggang Hu"
        },
        {
            "authorId": "2292257934",
            "name": "Binang He"
        }
    ],
    "doi": null,
    "intent": [
        "methodology",
        "background"
    ],
    "isInfluential": true,
    "paperId": "ee55ad9dda7f4f9b7749985b590dd7e9304c29c3",
    "title": "Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks",
    "url": "https://www.semanticscholar.org/paper/ee55ad9dda7f4f9b7749985b590dd7e9304c29c3",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2261119688",
            "name": "Michele Orr\u00f9"
        },
        {
            "authorId": "10175984",
            "name": "George Kadianakis"
        },
        {
            "authorId": "3476480",
            "name": "Mary Maller"
        },
        {
            "authorId": "2284922741",
            "name": "Greg Zaverucha"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "4d64383aefc5e100491f8812a06c45192fef9412",
    "title": "Beyond the circuit: How to Minimize Foreign Arithmetic in ZKP Circuits",
    "url": "https://www.semanticscholar.org/paper/4d64383aefc5e100491f8812a06c45192fef9412",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2068041668",
            "name": "Qi Feng"
        },
        {
            "authorId": "2278403542",
            "name": "Kang Yang"
        },
        {
            "authorId": "2152981309",
            "name": "Kaiyi Zhang"
        },
        {
            "authorId": "2257243980",
            "name": "Xiao Wang"
        },
        {
            "authorId": "2258336813",
            "name": "Yu Yu"
        },
        {
            "authorId": "2256303510",
            "name": "Xiang Xie"
        },
        {
            "authorId": "2261406026",
            "name": "Debiao He"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "2cea4817b8b6a07b244b8a779bf7a09e7b32f4a7",
    "title": "Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication",
    "url": "https://www.semanticscholar.org/paper/2cea4817b8b6a07b244b8a779bf7a09e7b32f4a7",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2265761550",
            "name": "Santiago Arranz Olmos"
        },
        {
            "authorId": "2257231143",
            "name": "Gilles Barthe"
        },
        {
            "authorId": "2313626348",
            "name": "Lionel Blatter"
        },
        {
            "authorId": "2257291250",
            "name": "Benjamin Gr\u00e9goire"
        },
        {
            "authorId": "2101651378",
            "name": "Vincent Laporte"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "5e10a949ce1452db2cc065985bc7f3006bee8990",
    "title": "Preservation of Speculative Constant-time by Compilation",
    "url": "https://www.semanticscholar.org/paper/5e10a949ce1452db2cc065985bc7f3006bee8990",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2312400286",
            "name": "Ping-Lun Wang"
        },
        {
            "authorId": "2312307168",
            "name": "Riccardo Paccagnella"
        },
        {
            "authorId": "3031766",
            "name": "R. Wahby"
        },
        {
            "authorId": "2312308561",
            "name": "Fraser Brown"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "ef5f7a27c699fc3532b911cd4753f8c73094f2a4",
    "title": "Bending microarchitectural weird machines towards practicality",
    "url": "https://www.semanticscholar.org/paper/ef5f7a27c699fc3532b911cd4753f8c73094f2a4",
    "venue": "USENIX Security Symposium",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2116887499",
            "name": "Yao Sun"
        },
        {
            "authorId": "2226098544",
            "name": "Shuai Chang"
        }
    ],
    "doi": null,
    "intent": [
        "methodology",
        "background"
    ],
    "isInfluential": false,
    "paperId": "715a0bc4ce437a631e5a87f8d2696ae9faec11d8",
    "title": "A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic",
    "url": "https://www.semanticscholar.org/paper/715a0bc4ce437a631e5a87f8d2696ae9faec11d8",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1808007",
            "name": "Marco Macchetti"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "1613c09f3af3bd4a11acc953af526cc60b9c67b1",
    "title": "A Novel Related Nonce Attack for ECDSA",
    "url": "https://www.semanticscholar.org/paper/1613c09f3af3bd4a11acc953af526cc60b9c67b1",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2093030221",
            "name": "J. Surin"
        },
        {
            "authorId": "39974279",
            "name": "Shaanan N. Cohney"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "00dfd1e56cac94e47009accc5cec4ea9f9cf84b0",
    "title": "A Gentle Tutorial for Lattice-Based Cryptanalysis",
    "url": "https://www.semanticscholar.org/paper/00dfd1e56cac94e47009accc5cec4ea9f9cf84b0",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2190045087",
            "name": "Sen Deng"
        },
        {
            "authorId": "2145711629",
            "name": "Mengyuan Li"
        },
        {
            "authorId": "2115421125",
            "name": "Yining Tang"
        },
        {
            "authorId": "2230913662",
            "name": "Shuai Wang"
        },
        {
            "authorId": "2107708991",
            "name": "S. Yan"
        },
        {
            "authorId": "39939156",
            "name": "Yinqian Zhang"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "42949f11691add1d6ad161c5d05054673ee901bb",
    "title": "CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations",
    "url": "https://www.semanticscholar.org/paper/42949f11691add1d6ad161c5d05054673ee901bb",
    "venue": "USENIX Security Symposium",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": null,
            "name": "Zirui Neil Zhao"
        },
        {
            "authorId": "143628061",
            "name": "Adam Morrison"
        },
        {
            "authorId": "2012099",
            "name": "Christopher W. Fletcher"
        },
        {
            "authorId": "1695950",
            "name": "J. Torrellas"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": true,
    "paperId": "f2e659860930d57b0424f18835fa8df92fe5921c",
    "title": "Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker",
    "url": "https://www.semanticscholar.org/paper/f2e659860930d57b0424f18835fa8df92fe5921c",
    "venue": "USENIX Security Symposium",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "144713424",
            "name": "Melissa Chase"
        },
        {
            "authorId": "40535555",
            "name": "Michele Orr\u00f9"
        },
        {
            "authorId": "34998734",
            "name": "Trevor Perrin"
        },
        {
            "authorId": "48298655",
            "name": "Greg Zaverucha"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "55cc5ae7aaa7d5beb90a8f3c9943000e529f6812",
    "title": "Proofs of discrete logarithm equality across groups",
    "url": "https://www.semanticscholar.org/paper/55cc5ae7aaa7d5beb90a8f3c9943000e529f6812",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1806514",
            "name": "G. Barbu"
        },
        {
            "authorId": "10380476",
            "name": "Ward Beullens"
        },
        {
            "authorId": "1735780",
            "name": "Emmanuelle Dottax"
        },
        {
            "authorId": "34734574",
            "name": "Christophe Giraud"
        },
        {
            "authorId": "2135848255",
            "name": "Agathe Houzelot"
        },
        {
            "authorId": "2588977",
            "name": "Chaoyun Li"
        },
        {
            "authorId": "2675135",
            "name": "M. Mahzoun"
        },
        {
            "authorId": "26357633",
            "name": "Adri\u00e1n Ranea"
        },
        {
            "authorId": "2153624000",
            "name": "Jianrui Xie"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "163edbb574589973131d03f5d0b54db63aa58be1",
    "title": "ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest",
    "url": "https://www.semanticscholar.org/paper/163edbb574589973131d03f5d0b54db63aa58be1",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2172535749",
            "name": "Miles Dai"
        },
        {
            "authorId": "153098244",
            "name": "Riccardo Paccagnella"
        },
        {
            "authorId": "2172708549",
            "name": "Miguel Gomez-Garcia"
        },
        {
            "authorId": "2304005",
            "name": "John D. McCalpin"
        },
        {
            "authorId": "34596687",
            "name": "Mengjia Yan"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "e876cd58c4fc0a7b1a5c96bb0e3bebc2e8339bcb",
    "title": "Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects",
    "url": "https://www.semanticscholar.org/paper/e876cd58c4fc0a7b1a5c96bb0e3bebc2e8339bcb",
    "venue": "USENIX Security Symposium",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2115739243",
            "name": "Kotaro Abe"
        },
        {
            "authorId": "144952437",
            "name": "M. Ikeda"
        }
    ],
    "doi": null,
    "intent": [
        "methodology",
        "background"
    ],
    "isInfluential": true,
    "paperId": "e30f7bbb70e1639f8caa5963390c8e5628b53ed7",
    "title": "Estimating the Effectiveness of Lattice Attacks",
    "url": "https://www.semanticscholar.org/paper/e30f7bbb70e1639f8caa5963390c8e5628b53ed7",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2021
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1703487",
            "name": "S. Krenn"
        },
        {
            "authorId": "40535555",
            "name": "Michele Orr\u00f9"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "6154ffde9cac0b7c391ac62b3829892751bb8063",
    "title": "Proposal: \u03a3 -protocols",
    "url": "https://www.semanticscholar.org/paper/6154ffde9cac0b7c391ac62b3829892751bb8063",
    "venue": "",
    "year": 2021
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1491077893",
            "name": "Haopeng Fan"
        },
        {
            "authorId": "6152731",
            "name": "Wenhao Wang"
        },
        {
            "authorId": "49417914",
            "name": "Yongjuan Wang"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "e6bf92297575cbcf7a8ccd7527176227279af2a5",
    "title": "Cache attack on MISTY1",
    "url": "https://www.semanticscholar.org/paper/e6bf92297575cbcf7a8ccd7527176227279af2a5",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2021
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "143962759",
            "name": "S. Galbraith"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "348433282315508769a65c221e44c44aebe0e5e8",
    "title": "CRYPTREC Review of EdDSA",
    "url": "https://www.semanticscholar.org/paper/348433282315508769a65c221e44c44aebe0e5e8",
    "venue": "",
    "year": 2020
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1393519076",
            "name": "Amber Sprenkels"
        },
        {
            "authorId": "3149910",
            "name": "B. Westerbaan"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "49883e051e235ee6cf4a751e2ebe5aa481d74c5c",
    "title": "Don't throw your nonces out with the bathwater",
    "url": "https://www.semanticscholar.org/paper/49883e051e235ee6cf4a751e2ebe5aa481d74c5c",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2020
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "51230705",
            "name": "Jan Wichelmann"
        },
        {
            "authorId": "2183604016",
            "name": "Anna P\u00e4tschke"
        },
        {
            "authorId": "1651159426",
            "name": "Luca Wilke"
        },
        {
            "authorId": "143719440",
            "name": "T. Eisenbarth"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "9e2e7c55a40397f6bf9b72750e1cff3c19b2b0df",
    "title": "This paper is included",
    "url": "https://www.semanticscholar.org/paper/9e2e7c55a40397f6bf9b72750e1cff3c19b2b0df",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "10665146",
            "name": "Ingab Kang"
        },
        {
            "authorId": "2260924416",
            "name": "Walter Wang"
        },
        {
            "authorId": "2261061594",
            "name": "Jason Kim"
        },
        {
            "authorId": "11018609",
            "name": "S. V. Schaik"
        },
        {
            "authorId": "30739562",
            "name": "Y. Tobah"
        },
        {
            "authorId": "2295580685",
            "name": "Daniel Genkin"
        },
        {
            "authorId": "2064221824",
            "name": "Andrew Kwong"
        },
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        }
    ],
    "doi": null,
    "intent": [
        "background",
        "result"
    ],
    "isInfluential": false,
    "paperId": "296d58f6ac0ca2b2eab4b1237876cfbf070edd9c",
    "title": "This paper is included in the Proceedings of the 33rd USENIX Security Symposium.",
    "url": "https://www.semanticscholar.org/paper/296d58f6ac0ca2b2eab4b1237876cfbf070edd9c",
    "venue": "",
    "year": null
}