Open aewag opened 1 week ago
Yes
I didnot find DOIs for the following references:
[
{
"key": "24_CR7",
"unstructured": "American National Standards Institute: ANSI X9.62-2005, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA) (2005)"
},
{
"key": "24_CR13",
"unstructured": "Bernstein, D.J.: Cache-timing attacks on AES. http://cr.yp.to/antiforgery/cachetiming-20050414.pdf (2005)"
},
{
"key": "24_CR27",
"first-page": "861",
"volume": "2019",
"author": "G De Micheli",
"year": "2019",
"unstructured": "De Micheli, G., Piau, R., Pierrot, C.: A tale of three signatures: practical attack of ECDSA with WNAF. IACR Crypt. ePrint Arch. 2019, 861 (2019)",
"journal-title": "IACR Crypt. ePrint Arch."
},
{
"key": "24_CR37",
"unstructured": "Halderman, J., et al.: Lest we remember: cold boot attacks on encryption keys. In: 17th USENIX Security Symposium, pp. 45\u201360 (2008)"
},
{
"key": "24_CR44",
"unstructured": "Lipp, M., et al.: Meltdown: reading kernel memory from user space. In: 27th USENIX Security Symposium, (USENIX Security), pp. 973\u2013990 (2018)"
},
{
"key": "24_CR50",
"unstructured": "Moghimi, D., Sunar, B., Eisenbarth, T., Heninger, N.: TPM-FAIL: TPM meets timing and lattice attacks. arXiv: Cryptography and Security (2019)"
},
{
"key": "24_CR52",
"unstructured": "National Institute of Standards and Technology: FIPS PUB 186\u20134 Digital Signature Standard (DSS), July 2013"
},
{
"volume-title": "How not to protect PCs from power analysis",
"year": "2006",
"author": "Y Oren",
"key": "24_CR57",
"unstructured": "Oren, Y., Shamir, A.: How not to protect PCs from power analysis. Rump Session, CRYPTO (2006)"
},
{
"key": "24_CR58",
"first-page": "169",
"volume": "2002",
"author": "D Page",
"year": "2002",
"unstructured": "Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Arch. 2002, 169 (2002)",
"journal-title": "IACR Cryptology ePrint Arch."
},
{
"key": "24_CR61",
"unstructured": "Ryan, K.: Return of the hidden number problem. a widespread and novel key extraction attack on ECDSA and DSA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 146\u2013168 (2019)"
},
{
"key": "24_CR69",
"unstructured": "Wong, D.: Timing and lattice attacks on a remote ECDSA openssl server: how practical are they really? IACR Cryptol. ePrint Arch. 839 (2015)"
},
{
"key": "24_CR70",
"unstructured": "Yarom, Y., Benger, N.: Recovering OpenSSL ECDSA nonces using the FLUSH+ RELOAD cache side-channel attack. IACR Cryptol. ePrint Arch. p. 140 (2014)"
},
{
"key": "24_CR71",
"unstructured": "Yarom, Y., Falkner, K.: Flush+Reload: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Conference on Security Symposium, pp. 719\u2013732 (2014)"
}
]
I failed to append the following reference to the review pipeline:
{
"arxivId": "1911.05673",
"authors": [
{
"authorId": "118654372",
"name": "D. Moghimi"
},
{
"authorId": "1714383",
"name": "B. Sunar"
},
{
"authorId": "143719440",
"name": "T. Eisenbarth"
},
{
"authorId": "2842650",
"name": "N. Heninger"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "a8b972b9106686bcc115276aec3602ec54bea025",
"title": "TPM-FAIL: TPM meets Timing and Lattice Attacks",
"url": "https://www.semanticscholar.org/paper/a8b972b9106686bcc115276aec3602ec54bea025",
"venue": "USENIX Security Symposium",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "8638444",
"name": "Alejandro Cabrera Aldaya"
},
{
"authorId": "3413188",
"name": "Cesar Pereida Garc\u00eda"
},
{
"authorId": "2065646070",
"name": "Luis Manuel Alvarez Tapia"
},
{
"authorId": "2863384",
"name": "B. Brumley"
}
],
"doi": "10.13154/TCHES.V2019.I4.213-242",
"intent": [],
"isInfluential": false,
"paperId": "23d755e35b01798302d296567cce7ce51f089ba5",
"title": "Cache-Timing Attacks on RSA Key Generation",
"url": "https://www.semanticscholar.org/paper/23d755e35b01798302d296567cce7ce51f089ba5",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "30512433",
"name": "Keegan Ryan"
}
],
"doi": "10.13154/tches.v2019.i1.146-168",
"intent": [],
"isInfluential": false,
"paperId": "f6ef2777eb666b466e05974dbca7cb342574e194",
"title": "Return of the Hidden Number Problem. A Widespread and Novel Key Extraction Attack on ECDSA and DSA",
"url": "https://www.semanticscholar.org/paper/f6ef2777eb666b466e05974dbca7cb342574e194",
"venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "49981379",
"name": "Moritz Lipp"
},
{
"authorId": "145694844",
"name": "Michael Schwarz"
},
{
"authorId": "2015792",
"name": "D. Gruss"
},
{
"authorId": "32135494",
"name": "Thomas Prescher"
},
{
"authorId": "1752878595",
"name": "Werner Haas"
},
{
"authorId": "1753078902",
"name": "Anders Fogh"
},
{
"authorId": "51207137",
"name": "Jann Horn"
},
{
"authorId": "1743786",
"name": "S. Mangard"
},
{
"authorId": "2211239",
"name": "P. Kocher"
},
{
"authorId": "2062558",
"name": "Daniel Genkin"
},
{
"authorId": "49968838",
"name": "Y. Yarom"
},
{
"authorId": "37584482",
"name": "Michael Hamburg"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "d916830788be8306ee896cb246615c5b217439a4",
"title": "Meltdown: Reading Kernel Memory from User Space",
"url": "https://www.semanticscholar.org/paper/d916830788be8306ee896cb246615c5b217439a4",
"venue": "USENIX Security Symposium",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "46239371",
"name": "Fergus Dall"
},
{
"authorId": "46195008",
"name": "Gabrielle De Micheli"
},
{
"authorId": "143719440",
"name": "T. Eisenbarth"
},
{
"authorId": "2062558",
"name": "Daniel Genkin"
},
{
"authorId": "2842650",
"name": "N. Heninger"
},
{
"authorId": "25141461",
"name": "A. Moghimi"
},
{
"authorId": "49968838",
"name": "Y. Yarom"
}
],
"doi": "10.13154/tches.v2018.i2.171-191",
"intent": [],
"isInfluential": false,
"paperId": "824906c89e86c42c3421b65bc2b9ee0cbca808f8",
"title": "CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks",
"url": "https://www.semanticscholar.org/paper/824906c89e86c42c3421b65bc2b9ee0cbca808f8",
"venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "49968838",
"name": "Y. Yarom"
},
{
"authorId": "1679867",
"name": "K. Falkner"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "447611b97696bf363409371fa6ffb7befc36e5b7",
"title": "FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack",
"url": "https://www.semanticscholar.org/paper/447611b97696bf363409371fa6ffb7befc36e5b7",
"venue": "USENIX Security Symposium",
"year": 2014
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2070614526",
"name": "David Wong"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "c45dbc9e2e03ef8a650b3f75871444615124f9d2",
"title": "Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?",
"url": "https://www.semanticscholar.org/paper/c45dbc9e2e03ef8a650b3f75871444615124f9d2",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2015
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2015792",
"name": "D. Gruss"
},
{
"authorId": "2547065",
"name": "Cl\u00e9mentine Maurice"
},
{
"authorId": "2068279072",
"name": "Klaus Wagner"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "7a002ef8c094a475faad7f1c8ba9cc1273908572",
"title": "Flush+Flush: A Stealthier Last-Level Cache Attack",
"url": "https://www.semanticscholar.org/paper/7a002ef8c094a475faad7f1c8ba9cc1273908572",
"venue": "ArXiv",
"year": 2015
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "49968838",
"name": "Y. Yarom"
},
{
"authorId": "2525494",
"name": "N. Benger"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "87d49f253a0e623e0255afa06d63e9b5a9fb09d0",
"title": "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack",
"url": "https://www.semanticscholar.org/paper/87d49f253a0e623e0255afa06d63e9b5a9fb09d0",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2014
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "145461375",
"name": "D. Page"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "e9daea3415a70b976b514f09beb5917ecd41fadd",
"title": "Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel",
"url": "https://www.semanticscholar.org/paper/e9daea3415a70b976b514f09beb5917ecd41fadd",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2002
}
WDYT? Is this publication in scope?
URL: http://dx.doi.org/10.1007/978-3-030-61638-0_24 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1007/978-3-030-61638-0_24