aewag / physical-attack-collection

0 stars 0 forks source link

Ma_2020 #1765

Open aewag opened 1 week ago

aewag commented 1 week ago

WDYT? Is this publication in scope?

@inbook{Ma_2020,
 author = {Ma, Ziqiang and Li, Bingyu and Cai, Quanwei and Yang, Jun},
 booktitle = {Applied Cryptography and Network Security Workshops},
 doi = {10.1007/978-3-030-61638-0_24},
 isbn = {9783030616380},
 issn = {1611-3349},
 pages = {435–452},
 publisher = {Springer International Publishing},
 title = {Applications and Developments of the Lattice Attack in Side Channel Attacks},
 url = {http://dx.doi.org/10.1007/978-3-030-61638-0_24},
 year = {2020}
}

URL: http://dx.doi.org/10.1007/978-3-030-61638-0_24 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1007/978-3-030-61638-0_24

aewag commented 1 week ago

Yes

aewag commented 1 week ago

I didnot find DOIs for the following references:

[
    {
        "key": "24_CR7",
        "unstructured": "American National Standards Institute: ANSI X9.62-2005, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA) (2005)"
    },
    {
        "key": "24_CR13",
        "unstructured": "Bernstein, D.J.: Cache-timing attacks on AES. http://cr.yp.to/antiforgery/cachetiming-20050414.pdf (2005)"
    },
    {
        "key": "24_CR27",
        "first-page": "861",
        "volume": "2019",
        "author": "G De Micheli",
        "year": "2019",
        "unstructured": "De Micheli, G., Piau, R., Pierrot, C.: A tale of three signatures: practical attack of ECDSA with WNAF. IACR Crypt. ePrint Arch. 2019, 861 (2019)",
        "journal-title": "IACR Crypt. ePrint Arch."
    },
    {
        "key": "24_CR37",
        "unstructured": "Halderman, J., et al.: Lest we remember: cold boot attacks on encryption keys. In: 17th USENIX Security Symposium, pp. 45\u201360 (2008)"
    },
    {
        "key": "24_CR44",
        "unstructured": "Lipp, M., et al.: Meltdown: reading kernel memory from user space. In: 27th USENIX Security Symposium, (USENIX Security), pp. 973\u2013990 (2018)"
    },
    {
        "key": "24_CR50",
        "unstructured": "Moghimi, D., Sunar, B., Eisenbarth, T., Heninger, N.: TPM-FAIL: TPM meets timing and lattice attacks. arXiv: Cryptography and Security (2019)"
    },
    {
        "key": "24_CR52",
        "unstructured": "National Institute of Standards and Technology: FIPS PUB 186\u20134 Digital Signature Standard (DSS), July 2013"
    },
    {
        "volume-title": "How not to protect PCs from power analysis",
        "year": "2006",
        "author": "Y Oren",
        "key": "24_CR57",
        "unstructured": "Oren, Y., Shamir, A.: How not to protect PCs from power analysis. Rump Session, CRYPTO (2006)"
    },
    {
        "key": "24_CR58",
        "first-page": "169",
        "volume": "2002",
        "author": "D Page",
        "year": "2002",
        "unstructured": "Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Arch. 2002, 169 (2002)",
        "journal-title": "IACR Cryptology ePrint Arch."
    },
    {
        "key": "24_CR61",
        "unstructured": "Ryan, K.: Return of the hidden number problem. a widespread and novel key extraction attack on ECDSA and DSA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 146\u2013168 (2019)"
    },
    {
        "key": "24_CR69",
        "unstructured": "Wong, D.: Timing and lattice attacks on a remote ECDSA openssl server: how practical are they really? IACR Cryptol. ePrint Arch. 839 (2015)"
    },
    {
        "key": "24_CR70",
        "unstructured": "Yarom, Y., Benger, N.: Recovering OpenSSL ECDSA nonces using the FLUSH+ RELOAD cache side-channel attack. IACR Cryptol. ePrint Arch. p. 140 (2014)"
    },
    {
        "key": "24_CR71",
        "unstructured": "Yarom, Y., Falkner, K.: Flush+Reload: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Conference on Security Symposium, pp. 719\u2013732 (2014)"
    }
]

I failed to append the following reference to the review pipeline:

{
    "arxivId": "1911.05673",
    "authors": [
        {
            "authorId": "118654372",
            "name": "D. Moghimi"
        },
        {
            "authorId": "1714383",
            "name": "B. Sunar"
        },
        {
            "authorId": "143719440",
            "name": "T. Eisenbarth"
        },
        {
            "authorId": "2842650",
            "name": "N. Heninger"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "a8b972b9106686bcc115276aec3602ec54bea025",
    "title": "TPM-FAIL: TPM meets Timing and Lattice Attacks",
    "url": "https://www.semanticscholar.org/paper/a8b972b9106686bcc115276aec3602ec54bea025",
    "venue": "USENIX Security Symposium",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "8638444",
            "name": "Alejandro Cabrera Aldaya"
        },
        {
            "authorId": "3413188",
            "name": "Cesar Pereida Garc\u00eda"
        },
        {
            "authorId": "2065646070",
            "name": "Luis Manuel Alvarez Tapia"
        },
        {
            "authorId": "2863384",
            "name": "B. Brumley"
        }
    ],
    "doi": "10.13154/TCHES.V2019.I4.213-242",
    "intent": [],
    "isInfluential": false,
    "paperId": "23d755e35b01798302d296567cce7ce51f089ba5",
    "title": "Cache-Timing Attacks on RSA Key Generation",
    "url": "https://www.semanticscholar.org/paper/23d755e35b01798302d296567cce7ce51f089ba5",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "30512433",
            "name": "Keegan Ryan"
        }
    ],
    "doi": "10.13154/tches.v2019.i1.146-168",
    "intent": [],
    "isInfluential": false,
    "paperId": "f6ef2777eb666b466e05974dbca7cb342574e194",
    "title": "Return of the Hidden Number Problem. A Widespread and Novel Key Extraction Attack on ECDSA and DSA",
    "url": "https://www.semanticscholar.org/paper/f6ef2777eb666b466e05974dbca7cb342574e194",
    "venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "49981379",
            "name": "Moritz Lipp"
        },
        {
            "authorId": "145694844",
            "name": "Michael Schwarz"
        },
        {
            "authorId": "2015792",
            "name": "D. Gruss"
        },
        {
            "authorId": "32135494",
            "name": "Thomas Prescher"
        },
        {
            "authorId": "1752878595",
            "name": "Werner Haas"
        },
        {
            "authorId": "1753078902",
            "name": "Anders Fogh"
        },
        {
            "authorId": "51207137",
            "name": "Jann Horn"
        },
        {
            "authorId": "1743786",
            "name": "S. Mangard"
        },
        {
            "authorId": "2211239",
            "name": "P. Kocher"
        },
        {
            "authorId": "2062558",
            "name": "Daniel Genkin"
        },
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        },
        {
            "authorId": "37584482",
            "name": "Michael Hamburg"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "d916830788be8306ee896cb246615c5b217439a4",
    "title": "Meltdown: Reading Kernel Memory from User Space",
    "url": "https://www.semanticscholar.org/paper/d916830788be8306ee896cb246615c5b217439a4",
    "venue": "USENIX Security Symposium",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "46239371",
            "name": "Fergus Dall"
        },
        {
            "authorId": "46195008",
            "name": "Gabrielle De Micheli"
        },
        {
            "authorId": "143719440",
            "name": "T. Eisenbarth"
        },
        {
            "authorId": "2062558",
            "name": "Daniel Genkin"
        },
        {
            "authorId": "2842650",
            "name": "N. Heninger"
        },
        {
            "authorId": "25141461",
            "name": "A. Moghimi"
        },
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        }
    ],
    "doi": "10.13154/tches.v2018.i2.171-191",
    "intent": [],
    "isInfluential": false,
    "paperId": "824906c89e86c42c3421b65bc2b9ee0cbca808f8",
    "title": "CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks",
    "url": "https://www.semanticscholar.org/paper/824906c89e86c42c3421b65bc2b9ee0cbca808f8",
    "venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        },
        {
            "authorId": "1679867",
            "name": "K. Falkner"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "447611b97696bf363409371fa6ffb7befc36e5b7",
    "title": "FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack",
    "url": "https://www.semanticscholar.org/paper/447611b97696bf363409371fa6ffb7befc36e5b7",
    "venue": "USENIX Security Symposium",
    "year": 2014
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2070614526",
            "name": "David Wong"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "c45dbc9e2e03ef8a650b3f75871444615124f9d2",
    "title": "Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?",
    "url": "https://www.semanticscholar.org/paper/c45dbc9e2e03ef8a650b3f75871444615124f9d2",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2015
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2015792",
            "name": "D. Gruss"
        },
        {
            "authorId": "2547065",
            "name": "Cl\u00e9mentine Maurice"
        },
        {
            "authorId": "2068279072",
            "name": "Klaus Wagner"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "7a002ef8c094a475faad7f1c8ba9cc1273908572",
    "title": "Flush+Flush: A Stealthier Last-Level Cache Attack",
    "url": "https://www.semanticscholar.org/paper/7a002ef8c094a475faad7f1c8ba9cc1273908572",
    "venue": "ArXiv",
    "year": 2015
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        },
        {
            "authorId": "2525494",
            "name": "N. Benger"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "87d49f253a0e623e0255afa06d63e9b5a9fb09d0",
    "title": "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack",
    "url": "https://www.semanticscholar.org/paper/87d49f253a0e623e0255afa06d63e9b5a9fb09d0",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2014
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "145461375",
            "name": "D. Page"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "e9daea3415a70b976b514f09beb5917ecd41fadd",
    "title": "Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel",
    "url": "https://www.semanticscholar.org/paper/e9daea3415a70b976b514f09beb5917ecd41fadd",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2002
}