Open aewag opened 4 days ago
Yes
I didnot find DOIs for the following references:
[
{
"unstructured": "Aranha, D.F., Orlandi, C., Takahashi, A., Zaverucha, G.: Security of hedged Fiat-Shamir signatures under fault attacks. Cryptology ePrint Archive, Report 2019/956 (2019)",
"key": "23_CR5"
},
{
"unstructured": "Baert, M.: Ed25519 leaks private key if public key is incorrect #170. https://github.com/jedisct1/libsodium/issues/170",
"key": "23_CR7"
},
{
"unstructured": "Bindel, N., et al.: qTESLA. Technical report, National Institute of Standards and Technology. https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions",
"key": "23_CR17"
},
{
"unstructured": "Bleichenbacher, D.: On the generation of one-time keys in DL signature schemes. Presentation at IEEE P1363 Working Group Meeting (2000)",
"key": "23_CR18"
},
{
"unstructured": "Chailloux, A.: Quantum security of the Fiat-Shamir transform of commit and open protocols. Cryptology ePrint Archive, Report 2019/699 (2019)",
"key": "23_CR24"
},
{
"unstructured": "Damg\u00e5rd, I.: On $$\\varSigma $$-protocols. http://www.cs.au.dk/~ivan/Sigma.pdf",
"key": "23_CR30"
},
{
"key": "23_CR32",
"first-page": "25",
"volume": "1",
"author": "L De Meyer",
"year": "2019",
"unstructured": "De Meyer, L., Arribas, V., Nikova, S., Nikov, V., Rijmen, V.: M&M: masks and macs against physical attacks. IACR TCHES 1, 25\u201350 (2019)",
"journal-title": "IACR TCHES"
},
{
"unstructured": "fail0verflow: Console hacking 2010 - PS3 epic fail. 27th Chaos Communications Congress (2010)",
"key": "23_CR36"
},
{
"volume-title": "Foundations of Cryptography",
"year": "2000",
"author": "O Goldreich",
"unstructured": "Goldreich, O.: Foundations of Cryptography, vol. 1. Cambridge University Press, New York (2000)",
"key": "23_CR44"
},
{
"unstructured": "Perrin, T.: The XEdDSA and VXEdDSA Signature Schemes. Signalrevision 1. https://signal.org/docs/specifications/xeddsa/",
"key": "23_CR61"
},
{
"unstructured": "Ristenpart, T., Yilek, S.: When good randomness goes bad: virtual machine reset vulnerabilities and hedging deployed cryptography. In: NDSS 2010. The Internet Society (2010)",
"key": "23_CR65"
},
{
"unstructured": "Schmidt, B.: [curves] EdDSA specification. https://moderncrypto.org/mail-archive/curves/2016/000768.html",
"key": "23_CR68"
},
{
"unstructured": "Zaverucha, G., et al.: Picnic. Technical report, National Institute of Standards and Technology. https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions",
"key": "23_CR72"
}
]
I failed to append the following reference to the review pipeline:
{
"arxivId": "1906.05415",
"authors": [
{
"authorId": "2406710",
"name": "A. Chailloux"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "38906e682d0df2007d50d08d545bbd86cdfd2b49",
"title": "Quantum security of the Fiat-Shamir transform of commit and open protocols",
"url": "https://www.semanticscholar.org/paper/38906e682d0df2007d50d08d545bbd86cdfd2b49",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "31597853",
"name": "L. Meyer"
},
{
"authorId": "40299836",
"name": "V\u00edctor Arribas"
},
{
"authorId": "145108557",
"name": "S. Nikova"
},
{
"authorId": "143963610",
"name": "V. Nikov"
},
{
"authorId": "1684989",
"name": "V. Rijmen"
}
],
"doi": "10.13154/tches.v2019.i1.25-50",
"intent": [],
"isInfluential": false,
"paperId": "2240fc8f898636613daace286e63789bcd7cd5eb",
"title": "M&M: Masks and Macs against Physical Attacks",
"url": "https://www.semanticscholar.org/paper/2240fc8f898636613daace286e63789bcd7cd5eb",
"venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "144087378",
"name": "Akira Takahashi"
},
{
"authorId": "1678628",
"name": "Mehdi Tibouchi"
},
{
"authorId": "143972370",
"name": "Masayuki Abe"
}
],
"doi": "10.13154/tches.v2018.i3.331-371",
"intent": [],
"isInfluential": false,
"paperId": "4da8294cdfa37019eeef066a14d908238a910298",
"title": "New Bleichenbacher Records: Practical Fault Attacks on qDSA Signatures",
"url": "https://www.semanticscholar.org/paper/4da8294cdfa37019eeef066a14d908238a910298",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2011281",
"name": "Christoph Dobraunig"
},
{
"authorId": "1885627",
"name": "Maria Eichlseder"
},
{
"authorId": "2795931",
"name": "Thomas Korak"
},
{
"authorId": "1743786",
"name": "S. Mangard"
},
{
"authorId": "1908735",
"name": "Florian Mendel"
},
{
"authorId": "20620000",
"name": "R. Primas"
}
],
"doi": "10.13154/tches.v2018.i3.547-572",
"intent": [],
"isInfluential": false,
"paperId": "7feda5e271d9508ff648b6eef16ba691644cc2fd",
"title": "Exploiting Ineffective Fault Inductions on Symmetric Cryptography",
"url": "https://www.semanticscholar.org/paper/7feda5e271d9508ff648b6eef16ba691644cc2fd",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "3364677",
"name": "L. G. Bruinderink"
},
{
"authorId": "3241376",
"name": "P. Pessl"
}
],
"doi": "10.13154/tches.v2018.i3.21-43",
"intent": [],
"isInfluential": false,
"paperId": "de54744651d09e77bded45b53c6fed2c29ff8c04",
"title": "Differential Fault Attacks on Deterministic Lattice Signatures",
"url": "https://www.semanticscholar.org/paper/de54744651d09e77bded45b53c6fed2c29ff8c04",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "3228981",
"name": "Carmit Hazay"
},
{
"authorId": "1682750",
"name": "Yehuda Lindell"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "7098cffc6ce275b271528d87a00cf110b4a40561",
"title": "Efficient Secure Two-Party Protocols: Techniques and Constructions",
"url": "https://www.semanticscholar.org/paper/7098cffc6ce275b271528d87a00cf110b4a40561",
"venue": "",
"year": 2010
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "144747292",
"name": "J. Kilian"
},
{
"authorId": "1689467",
"name": "S. Micali"
},
{
"authorId": "1748224",
"name": "R. Ostrovsky"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "cc02218cd2cfdf40d602731c8b19c9be5d9016c9",
"title": "Minimum resource zero-knowledge proofs (extended abstracts)",
"url": "https://www.semanticscholar.org/paper/cc02218cd2cfdf40d602731c8b19c9be5d9016c9",
"venue": "CRYPTO 1989",
"year": 1989
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [
"methodology",
"background"
],
"isInfluential": true,
"paperId": "",
"title": "Security of Hedged Fiat-Shamir Signatures under Fault Attacks.",
"url": "",
"venue": "",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1696055",
"name": "M. Fischlin"
},
{
"authorId": "46738605",
"name": "Felix G\u00fcnther"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "0bd1d19b2ef7e85013cb39139f44c96ca811441c",
"title": "Modeling Memory Faults in Signature and Encryption Schemes",
"url": "https://www.semanticscholar.org/paper/0bd1d19b2ef7e85013cb39139f44c96ca811441c",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2747015",
"name": "B. Abdolmaleki"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "cd3e8ff044fc0cadc1ae5ef984542c6e6990daaa",
"title": "Non-Malleable Codes",
"url": "https://www.semanticscholar.org/paper/cd3e8ff044fc0cadc1ae5ef984542c6e6990daaa",
"venue": "",
"year": 2017
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "3025831",
"name": "Irene Giacomelli"
},
{
"authorId": "2057639455",
"name": "Jesper Madsen"
},
{
"authorId": "34593606",
"name": "Claudio Orlandi"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "75f5acbbd9ee8d1b133b707d79a2cf4a93351780",
"title": "ZKBoo: Faster Zero-Knowledge for Boolean Circuits",
"url": "https://www.semanticscholar.org/paper/75f5acbbd9ee8d1b133b707d79a2cf4a93351780",
"venue": "USENIX Security Symposium",
"year": 2016
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "The XEdDSA and VXEdDSA",
"url": "",
"venue": "Signature Schemes. Signal,",
"year": 2016
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "",
"title": "curves] EdDSA specification. https://moderncrypto.org/mail- archive/curves/2016/000768.html",
"url": "",
"venue": "",
"year": 2016
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Ed25519 leaks private key if public key is incorrect #170",
"url": "",
"venue": "https://github. com/jedisct1/libsodium/issues/170,",
"year": 2014
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1707461",
"name": "Thomas Ristenpart"
},
{
"authorId": "2187026",
"name": "Scott Yilek"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "c24da22ca27390433e38b96c70331d36997fb799",
"title": "When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography",
"url": "https://www.semanticscholar.org/paper/c24da22ca27390433e38b96c70331d36997fb799",
"venue": "NDSS",
"year": 2010
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Console hacking 2010 -PS3 epic fail. 27th Chaos Communications Congress",
"url": "",
"venue": "",
"year": 2010
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Defined formal model and security notions tailored to FS. \u2022 Proved (in)security of hedged FS signatures against basic faults and corrupt nonces",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "\u2022 Multi-bit/position faults. Partially handled by Fischlin and G\u00fcnther [FG20] (CT-RSA'20) for generic signatures",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Hedging is provably more resilient than the randomized/deterministic FS, but H \u2032 input/output should be protected! \u2022 Open questions \u2022 Extension to more advanced fault attacker model",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "If HT[a i , m i , pk] is already set (via A's previous hash or signing queries) and HT[a i , m i , pk] = e i , B aborts. Otherwise, B programs the random oracle so that HT",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "If random oracle programming is successful, B gives A a serialized transcript \u03c3 i := CSF(a i , e i , z i )",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Simulation of Faulty Signing Queries For each i \u2208 [Q s",
"url": "",
"venue": "B answers a faulty signing request from A by simulating the signature on m i as follows: 1. B first samples e i from D H uniformly at random",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "The qTESLA Team. Submission to NIST's post-quantum project (2nd round): lattice-based digital signature scheme qTESLA",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Serialize Output (e, z)",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Now we evaluate the probability that A distinguishes the simulated signing oracle above from the real one. There are essentially two cases",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Use seed * j to generate values seed j,1 , . . ., seed j,n with a PRG. Also compute aux j \u2208 {0, 1} |C| as described in the text. For i = 1, . . . , n \u2212 1, let state j,i := seed j,i",
"url": "",
"venue": "Com",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Let St := {seed * j }, {com j,i }, {state j,i }, {h j }, {h j } for j",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Initialize the output list z. For each j \u2208 [M ] \\ C, add seed * j , h j to z. Also, for each j \u2208 C, add {state j,i } i =pj , com j,pj , {\u1e91 j,\u03b1 }, and msgs j",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "\u2022 ID has \u03b1-bit min-entropy",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "= G(a, m), where C \u2282 [M ] is a set of size \u03c4 , and P is a list {p j } j\u2208C with p j \u2208",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "\u2022 ID is special c/s/p-HVZK with efficient distinguishers' advantage being at most HVZK",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Let ID be a correct canonical identification protocol and CSF be a canonical serialization function for ID",
"url": "",
"venue": "Lemma",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "com j,n ) and let h j := H 2 ({\u1e91 j,\u03b1 }, msgs j,1 , . . . , msgs j,n ). Let a := (h 1 , h 1",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "For i \u2208 [n], compute com j,i := H 0 (state j,i )",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "On the generation of one - time keys in DL signature schemes",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "The Picnic Design Team. The Picnic Signature Scheme Design Document",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2297210135",
"name": "Quan Yuan"
},
{
"authorId": "2297251680",
"name": "Chao Sun"
},
{
"authorId": "2281764167",
"name": "Tsuyoshi Takagi"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "1644053fb7c1029f8844f55172e40a212f75d270",
"title": "Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks",
"url": "https://www.semanticscholar.org/paper/1644053fb7c1029f8844f55172e40a212f75d270",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "3363611",
"name": "Weiqiong Cao"
},
{
"authorId": "2945682",
"name": "Hongsong Shi"
},
{
"authorId": "2051536214",
"name": "Hua Chen"
},
{
"authorId": "2056073530",
"name": "Wei Xi"
},
{
"authorId": "1417813900",
"name": "Haoyuan Li"
},
{
"authorId": "39695064",
"name": "Limin Fan"
},
{
"authorId": "34328176",
"name": "Wenling Wu"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "4a8ba309b32d1528e2d05bb8ee063a31bb111716",
"title": "Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA",
"url": "https://www.semanticscholar.org/paper/4a8ba309b32d1528e2d05bb8ee063a31bb111716",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2020
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1696055",
"name": "M. Fischlin"
},
{
"authorId": "46738605",
"name": "Felix G\u00fcnther"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "0bd1d19b2ef7e85013cb39139f44c96ca811441c",
"title": "Modeling Memory Faults in Signature and Encryption Schemes",
"url": "https://www.semanticscholar.org/paper/0bd1d19b2ef7e85013cb39139f44c96ca811441c",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2019
}
WDYT? Is this publication in scope?
URL: http://dx.doi.org/10.1007/978-3-030-45721-1_23 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1007/978-3-030-45721-1_23