Open aewag opened 5 days ago
Yes
I didnot find DOIs for the following references:
[
{
"key": "ref13",
"year": "0",
"journal-title": "Trusted firmware"
},
{
"key": "ref11",
"year": "0",
"journal-title": "MbedTLS security disclosures"
},
{
"key": "ref18",
"article-title": "When one vulnerable primitive turns viral: Novel single-trace attacks on ecdsa and rsa",
"author": "aldaya",
"year": "2020",
"journal-title": "Cryptology ePrint Archive"
},
{
"key": "ref4",
"article-title": "Seriously, get off my cloud! cross-vm rsa key recovery in a public cloud",
"author": "inci",
"year": "2015",
"journal-title": "Cryptology ePrint Archive"
},
{
"key": "ref3",
"first-page": "719",
"article-title": "FLUSH+ RELOAD: A high resolution, low noise, 13 cache side-channel attack",
"author": "yarom",
"year": "2014",
"journal-title": "23rd USENIX Security Symposium (USENIX Security 14)"
},
{
"key": "ref5",
"article-title": "Recovering cryptographic keys from partial information, by example",
"author": "de micheli",
"year": "2020",
"journal-title": "Cryptology ePrint Archive"
}
]
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "8638444",
"name": "Alejandro Cabrera Aldaya"
},
{
"authorId": "2863384",
"name": "B. Brumley"
}
],
"doi": "10.13154/tches.v2020.i2.196-221",
"intent": [
"background"
],
"isInfluential": false,
"paperId": "ffb68c1ef8ead388ffbd05fdcee3004c43fff8aa",
"title": "When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA",
"url": "https://www.semanticscholar.org/paper/ffb68c1ef8ead388ffbd05fdcee3004c43fff8aa",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2020
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "49968838",
"name": "Y. Yarom"
},
{
"authorId": "1679867",
"name": "K. Falkner"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "447611b97696bf363409371fa6ffb7befc36e5b7",
"title": "FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack",
"url": "https://www.semanticscholar.org/paper/447611b97696bf363409371fa6ffb7befc36e5b7",
"venue": "USENIX Security Symposium",
"year": 2014
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "39173754",
"name": "Mehmet Sinan Inci"
},
{
"authorId": "2896147",
"name": "Berk G\u00fclmezoglu"
},
{
"authorId": "2835874",
"name": "Gorka Irazoqui Apecechea"
},
{
"authorId": "143719440",
"name": "T. Eisenbarth"
},
{
"authorId": "1714383",
"name": "B. Sunar"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "8372016fe38121358163c20f88e28fc0267e30b1",
"title": "Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud",
"url": "https://www.semanticscholar.org/paper/8372016fe38121358163c20f88e28fc0267e30b1",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2015
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "3f725133f661baf374a419acfaf6b8d28187e90a",
"title": "Available from the IACR Cryptology ePrint Archive as Report 2008/510. Reconstructing RSA Private Keys from Random Key Bits",
"url": "https://www.semanticscholar.org/paper/3f725133f661baf374a419acfaf6b8d28187e90a",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "",
"title": "\u201cMbedTLS security disclosures.\u201d",
"url": "",
"venue": ":",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "",
"title": "\u201cTrusted firmware.\u201d",
"url": "",
"venue": "trustedfirmware.org/",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2263682",
"name": "Jo Van Bulck"
},
{
"authorId": "1739936",
"name": "Frank Piessens"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "ca9972e9932ee3037bc69dc2fd759cfaa23eb45a",
"title": "SGX-Step: An Open-Source Framework for Precise Dissection and Practical Exploitation of Intel SGX Enclaves",
"url": "https://www.semanticscholar.org/paper/ca9972e9932ee3037bc69dc2fd759cfaa23eb45a",
"venue": "",
"year": null
}
WDYT? Is this publication in scope?
URL: http://dx.doi.org/10.23919/DATE56975.2023.10137116 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.23919/date56975.2023.10137116