aewag / physical-attack-collection

0 stars 0 forks source link

Aranha_2020a #1767

Open aewag opened 4 days ago

aewag commented 4 days ago

WDYT? Is this publication in scope?

@inbook{Aranha_2020,
 author = {Aranha, Diego F. and Orlandi, Claudio and Takahashi, Akira and Zaverucha, Greg},
 booktitle = {Advances in Cryptology – EUROCRYPT 2020},
 doi = {10.1007/978-3-030-45721-1_23},
 isbn = {9783030457211},
 issn = {1611-3349},
 pages = {644–674},
 publisher = {Springer International Publishing},
 title = {Security of Hedged Fiat–Shamir Signatures Under Fault Attacks},
 url = {http://dx.doi.org/10.1007/978-3-030-45721-1_23},
 year = {2020}
}

URL: http://dx.doi.org/10.1007/978-3-030-45721-1_23 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1007/978-3-030-45721-1_23

aewag commented 4 days ago

Yes

aewag commented 3 days ago

I didnot find DOIs for the following references:

[
    {
        "unstructured": "Aranha, D.F., Orlandi, C., Takahashi, A., Zaverucha, G.: Security of hedged Fiat-Shamir signatures under fault attacks. Cryptology ePrint Archive, Report 2019/956 (2019)",
        "key": "23_CR5"
    },
    {
        "unstructured": "Baert, M.: Ed25519 leaks private key if public key is incorrect #170. https://github.com/jedisct1/libsodium/issues/170",
        "key": "23_CR7"
    },
    {
        "unstructured": "Bindel, N., et al.: qTESLA. Technical report, National Institute of Standards and Technology. https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions",
        "key": "23_CR17"
    },
    {
        "unstructured": "Bleichenbacher, D.: On the generation of one-time keys in DL signature schemes. Presentation at IEEE P1363 Working Group Meeting (2000)",
        "key": "23_CR18"
    },
    {
        "unstructured": "Chailloux, A.: Quantum security of the Fiat-Shamir transform of commit and open protocols. Cryptology ePrint Archive, Report 2019/699 (2019)",
        "key": "23_CR24"
    },
    {
        "unstructured": "Damg\u00e5rd, I.: On $$\\varSigma $$-protocols. http://www.cs.au.dk/~ivan/Sigma.pdf",
        "key": "23_CR30"
    },
    {
        "key": "23_CR32",
        "first-page": "25",
        "volume": "1",
        "author": "L De Meyer",
        "year": "2019",
        "unstructured": "De Meyer, L., Arribas, V., Nikova, S., Nikov, V., Rijmen, V.: M&M: masks and macs against physical attacks. IACR TCHES 1, 25\u201350 (2019)",
        "journal-title": "IACR TCHES"
    },
    {
        "unstructured": "fail0verflow: Console hacking 2010 - PS3 epic fail. 27th Chaos Communications Congress (2010)",
        "key": "23_CR36"
    },
    {
        "volume-title": "Foundations of Cryptography",
        "year": "2000",
        "author": "O Goldreich",
        "unstructured": "Goldreich, O.: Foundations of Cryptography, vol. 1. Cambridge University Press, New York (2000)",
        "key": "23_CR44"
    },
    {
        "unstructured": "Perrin, T.: The XEdDSA and VXEdDSA Signature Schemes. Signalrevision 1. https://signal.org/docs/specifications/xeddsa/",
        "key": "23_CR61"
    },
    {
        "unstructured": "Ristenpart, T., Yilek, S.: When good randomness goes bad: virtual machine reset vulnerabilities and hedging deployed cryptography. In: NDSS 2010. The Internet Society (2010)",
        "key": "23_CR65"
    },
    {
        "unstructured": "Schmidt, B.: [curves] EdDSA specification. https://moderncrypto.org/mail-archive/curves/2016/000768.html",
        "key": "23_CR68"
    },
    {
        "unstructured": "Zaverucha, G., et al.: Picnic. Technical report, National Institute of Standards and Technology. https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions",
        "key": "23_CR72"
    }
]

I failed to append the following reference to the review pipeline:

{
    "arxivId": "1906.05415",
    "authors": [
        {
            "authorId": "2406710",
            "name": "A. Chailloux"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "38906e682d0df2007d50d08d545bbd86cdfd2b49",
    "title": "Quantum security of the Fiat-Shamir transform of commit and open protocols",
    "url": "https://www.semanticscholar.org/paper/38906e682d0df2007d50d08d545bbd86cdfd2b49",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "31597853",
            "name": "L. Meyer"
        },
        {
            "authorId": "40299836",
            "name": "V\u00edctor Arribas"
        },
        {
            "authorId": "145108557",
            "name": "S. Nikova"
        },
        {
            "authorId": "143963610",
            "name": "V. Nikov"
        },
        {
            "authorId": "1684989",
            "name": "V. Rijmen"
        }
    ],
    "doi": "10.13154/tches.v2019.i1.25-50",
    "intent": [],
    "isInfluential": false,
    "paperId": "2240fc8f898636613daace286e63789bcd7cd5eb",
    "title": "M&M: Masks and Macs against Physical Attacks",
    "url": "https://www.semanticscholar.org/paper/2240fc8f898636613daace286e63789bcd7cd5eb",
    "venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "144087378",
            "name": "Akira Takahashi"
        },
        {
            "authorId": "1678628",
            "name": "Mehdi Tibouchi"
        },
        {
            "authorId": "143972370",
            "name": "Masayuki Abe"
        }
    ],
    "doi": "10.13154/tches.v2018.i3.331-371",
    "intent": [],
    "isInfluential": false,
    "paperId": "4da8294cdfa37019eeef066a14d908238a910298",
    "title": "New Bleichenbacher Records: Practical Fault Attacks on qDSA Signatures",
    "url": "https://www.semanticscholar.org/paper/4da8294cdfa37019eeef066a14d908238a910298",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2011281",
            "name": "Christoph Dobraunig"
        },
        {
            "authorId": "1885627",
            "name": "Maria Eichlseder"
        },
        {
            "authorId": "2795931",
            "name": "Thomas Korak"
        },
        {
            "authorId": "1743786",
            "name": "S. Mangard"
        },
        {
            "authorId": "1908735",
            "name": "Florian Mendel"
        },
        {
            "authorId": "20620000",
            "name": "R. Primas"
        }
    ],
    "doi": "10.13154/tches.v2018.i3.547-572",
    "intent": [],
    "isInfluential": false,
    "paperId": "7feda5e271d9508ff648b6eef16ba691644cc2fd",
    "title": "Exploiting Ineffective Fault Inductions on Symmetric Cryptography",
    "url": "https://www.semanticscholar.org/paper/7feda5e271d9508ff648b6eef16ba691644cc2fd",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "3364677",
            "name": "L. G. Bruinderink"
        },
        {
            "authorId": "3241376",
            "name": "P. Pessl"
        }
    ],
    "doi": "10.13154/tches.v2018.i3.21-43",
    "intent": [],
    "isInfluential": false,
    "paperId": "de54744651d09e77bded45b53c6fed2c29ff8c04",
    "title": "Differential Fault Attacks on Deterministic Lattice Signatures",
    "url": "https://www.semanticscholar.org/paper/de54744651d09e77bded45b53c6fed2c29ff8c04",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "3228981",
            "name": "Carmit Hazay"
        },
        {
            "authorId": "1682750",
            "name": "Yehuda Lindell"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "7098cffc6ce275b271528d87a00cf110b4a40561",
    "title": "Efficient Secure Two-Party Protocols: Techniques and Constructions",
    "url": "https://www.semanticscholar.org/paper/7098cffc6ce275b271528d87a00cf110b4a40561",
    "venue": "",
    "year": 2010
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "144747292",
            "name": "J. Kilian"
        },
        {
            "authorId": "1689467",
            "name": "S. Micali"
        },
        {
            "authorId": "1748224",
            "name": "R. Ostrovsky"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "cc02218cd2cfdf40d602731c8b19c9be5d9016c9",
    "title": "Minimum resource zero-knowledge proofs (extended abstracts)",
    "url": "https://www.semanticscholar.org/paper/cc02218cd2cfdf40d602731c8b19c9be5d9016c9",
    "venue": "CRYPTO 1989",
    "year": 1989
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [
        "methodology",
        "background"
    ],
    "isInfluential": true,
    "paperId": "",
    "title": "Security of Hedged Fiat-Shamir Signatures under Fault Attacks.",
    "url": "",
    "venue": "",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1696055",
            "name": "M. Fischlin"
        },
        {
            "authorId": "46738605",
            "name": "Felix G\u00fcnther"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "0bd1d19b2ef7e85013cb39139f44c96ca811441c",
    "title": "Modeling Memory Faults in Signature and Encryption Schemes",
    "url": "https://www.semanticscholar.org/paper/0bd1d19b2ef7e85013cb39139f44c96ca811441c",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2747015",
            "name": "B. Abdolmaleki"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "cd3e8ff044fc0cadc1ae5ef984542c6e6990daaa",
    "title": "Non-Malleable Codes",
    "url": "https://www.semanticscholar.org/paper/cd3e8ff044fc0cadc1ae5ef984542c6e6990daaa",
    "venue": "",
    "year": 2017
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "3025831",
            "name": "Irene Giacomelli"
        },
        {
            "authorId": "2057639455",
            "name": "Jesper Madsen"
        },
        {
            "authorId": "34593606",
            "name": "Claudio Orlandi"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "75f5acbbd9ee8d1b133b707d79a2cf4a93351780",
    "title": "ZKBoo: Faster Zero-Knowledge for Boolean Circuits",
    "url": "https://www.semanticscholar.org/paper/75f5acbbd9ee8d1b133b707d79a2cf4a93351780",
    "venue": "USENIX Security Symposium",
    "year": 2016
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "The XEdDSA and VXEdDSA",
    "url": "",
    "venue": "Signature Schemes. Signal,",
    "year": 2016
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "",
    "title": "curves] EdDSA specification. https://moderncrypto.org/mail- archive/curves/2016/000768.html",
    "url": "",
    "venue": "",
    "year": 2016
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Ed25519 leaks private key if public key is incorrect #170",
    "url": "",
    "venue": "https://github. com/jedisct1/libsodium/issues/170,",
    "year": 2014
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1707461",
            "name": "Thomas Ristenpart"
        },
        {
            "authorId": "2187026",
            "name": "Scott Yilek"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "c24da22ca27390433e38b96c70331d36997fb799",
    "title": "When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography",
    "url": "https://www.semanticscholar.org/paper/c24da22ca27390433e38b96c70331d36997fb799",
    "venue": "NDSS",
    "year": 2010
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Console hacking 2010 -PS3 epic fail. 27th Chaos Communications Congress",
    "url": "",
    "venue": "",
    "year": 2010
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Defined formal model and security notions tailored to FS. \u2022 Proved (in)security of hedged FS signatures against basic faults and corrupt nonces",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "\u2022 Multi-bit/position faults. Partially handled by Fischlin and G\u00fcnther [FG20] (CT-RSA'20) for generic signatures",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Hedging is provably more resilient than the randomized/deterministic FS, but H \u2032 input/output should be protected! \u2022 Open questions \u2022 Extension to more advanced fault attacker model",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "If HT[a i , m i , pk] is already set (via A's previous hash or signing queries) and HT[a i , m i , pk] = e i , B aborts. Otherwise, B programs the random oracle so that HT",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "If random oracle programming is successful, B gives A a serialized transcript \u03c3 i := CSF(a i , e i , z i )",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Simulation of Faulty Signing Queries For each i \u2208 [Q s",
    "url": "",
    "venue": "B answers a faulty signing request from A by simulating the signature on m i as follows: 1. B first samples e i from D H uniformly at random",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "The qTESLA Team. Submission to NIST's post-quantum project (2nd round): lattice-based digital signature scheme qTESLA",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Serialize Output (e, z)",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Now we evaluate the probability that A distinguishes the simulated signing oracle above from the real one. There are essentially two cases",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Use seed * j to generate values seed j,1 , . . ., seed j,n with a PRG. Also compute aux j \u2208 {0, 1} |C| as described in the text. For i = 1, . . . , n \u2212 1, let state j,i := seed j,i",
    "url": "",
    "venue": "Com",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Let St := {seed * j }, {com j,i }, {state j,i }, {h j }, {h j } for j",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Initialize the output list z. For each j \u2208 [M ] \\ C, add seed * j , h j to z. Also, for each j \u2208 C, add {state j,i } i =pj , com j,pj , {\u1e91 j,\u03b1 }, and msgs j",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "\u2022 ID has \u03b1-bit min-entropy",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "= G(a, m), where C \u2282 [M ] is a set of size \u03c4 , and P is a list {p j } j\u2208C with p j \u2208",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "\u2022 ID is special c/s/p-HVZK with efficient distinguishers' advantage being at most HVZK",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Let ID be a correct canonical identification protocol and CSF be a canonical serialization function for ID",
    "url": "",
    "venue": "Lemma",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "com j,n ) and let h j := H 2 ({\u1e91 j,\u03b1 }, msgs j,1 , . . . , msgs j,n ). Let a := (h 1 , h 1",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "For i \u2208 [n], compute com j,i := H 0 (state j,i )",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "On the generation of one - time keys in DL signature schemes",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "The Picnic Design Team. The Picnic Signature Scheme Design Document",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2297210135",
            "name": "Quan Yuan"
        },
        {
            "authorId": "2297251680",
            "name": "Chao Sun"
        },
        {
            "authorId": "2281764167",
            "name": "Tsuyoshi Takagi"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "1644053fb7c1029f8844f55172e40a212f75d270",
    "title": "Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks",
    "url": "https://www.semanticscholar.org/paper/1644053fb7c1029f8844f55172e40a212f75d270",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "3363611",
            "name": "Weiqiong Cao"
        },
        {
            "authorId": "2945682",
            "name": "Hongsong Shi"
        },
        {
            "authorId": "2051536214",
            "name": "Hua Chen"
        },
        {
            "authorId": "2056073530",
            "name": "Wei Xi"
        },
        {
            "authorId": "1417813900",
            "name": "Haoyuan Li"
        },
        {
            "authorId": "39695064",
            "name": "Limin Fan"
        },
        {
            "authorId": "34328176",
            "name": "Wenling Wu"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "4a8ba309b32d1528e2d05bb8ee063a31bb111716",
    "title": "Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA",
    "url": "https://www.semanticscholar.org/paper/4a8ba309b32d1528e2d05bb8ee063a31bb111716",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2020
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1696055",
            "name": "M. Fischlin"
        },
        {
            "authorId": "46738605",
            "name": "Felix G\u00fcnther"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "0bd1d19b2ef7e85013cb39139f44c96ca811441c",
    "title": "Modeling Memory Faults in Signature and Encryption Schemes",
    "url": "https://www.semanticscholar.org/paper/0bd1d19b2ef7e85013cb39139f44c96ca811441c",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2019
}