Open aewag opened 5 days ago
yes
I didnot find DOIs for the following references:
[]
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2285118740",
"name": "C. M. Bishop"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "61a1565016477b2092a212e7af0e789a250bc552",
"title": "Pattern Recognition and Machine Learning (Information Science and Statistics)",
"url": "https://www.semanticscholar.org/paper/61a1565016477b2092a212e7af0e789a250bc552",
"venue": "",
"year": 2006
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1733999",
"name": "L. Wasserman"
}
],
"doi": null,
"intent": [
"methodology",
"background"
],
"isInfluential": true,
"paperId": "b3f8348133c1d2f76f1dc1272f748a0b28874d80",
"title": "All of Statistics: A Concise Course in Statistical Inference",
"url": "https://www.semanticscholar.org/paper/b3f8348133c1d2f76f1dc1272f748a0b28874d80",
"venue": "",
"year": 2004
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2815158",
"name": "Hakon Kile"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "4daf05cc2c5e12fef6e69f1d5e412f4368a01729",
"title": "Bandwidth Selection in Kernel Density Estimation",
"url": "https://www.semanticscholar.org/paper/4daf05cc2c5e12fef6e69f1d5e412f4368a01729",
"venue": "",
"year": 2010
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1706533",
"name": "Fran\u00e7ois-Xavier Standaert"
},
{
"authorId": "1769717",
"name": "T. Malkin"
},
{
"authorId": "144068857",
"name": "M. Yung"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "e41800d9c22503cce7da71f20d44733a0e40cd4a",
"title": "A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks",
"url": "https://www.semanticscholar.org/paper/e41800d9c22503cce7da71f20d44733a0e40cd4a",
"venue": "",
"year": 2006
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "CRYPTO 1999",
"url": "",
"venue": "LNCS, vol. 1666. Springer, Heidelberg",
"year": 1999
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "46512141",
"name": "J. Beirlant"
},
{
"authorId": "3147156",
"name": "E. Dudewicz"
},
{
"authorId": "2087528",
"name": "L. Gy\u00f6rfi"
},
{
"authorId": "46964079",
"name": "I. Denes"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "14ba9dccf06355d1c6478b843ccb8f56d7374409",
"title": "Nonparametric entropy estimation. An overview",
"url": "https://www.semanticscholar.org/paper/14ba9dccf06355d1c6478b843ccb8f56d7374409",
"venue": "",
"year": 1997
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2407.13383",
"authors": [
{
"authorId": "1579007630",
"name": "Nivedita Shrivastava"
},
{
"authorId": "2550384",
"name": "S. Sarangi"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "ea6007e56ef562e084b8d85a402b27456b6bb720",
"title": "NeuroPlug: Plugging Side-Channel Leaks in NPUs using Space Filling Curves",
"url": "https://www.semanticscholar.org/paper/ea6007e56ef562e084b8d85a402b27456b6bb720",
"venue": "",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2311.02628",
"authors": [
{
"authorId": "1579007630",
"name": "Nivedita Shrivastava"
},
{
"authorId": "2550384",
"name": "S. Sarangi"
}
],
"doi": "10.48550/arXiv.2311.02628",
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "8f03f195bacd67b350450aa2a793e7b9861afb17",
"title": "SparseLock: Securing Neural Network Models in Deep Learning Accelerators",
"url": "https://www.semanticscholar.org/paper/8f03f195bacd67b350450aa2a793e7b9861afb17",
"venue": "ArXiv",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "46585144",
"name": "Junwei Wang"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "06a05c5ecdfb9ab6867722752c16b1e8c21361dd",
"title": "On the practical security of white-box cryptography. (De la th\u00e9orie \u00e0 la pratique de la cryptographie en boite blanche)",
"url": "https://www.semanticscholar.org/paper/06a05c5ecdfb9ab6867722752c16b1e8c21361dd",
"venue": "",
"year": 2020
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "67042729",
"name": "Lo\u00efc Masure"
},
{
"authorId": "2026534",
"name": "C\u00e9cile Canovas"
},
{
"authorId": "1726631",
"name": "E. Prouff"
}
],
"doi": "10.13154/tches.v2020.i1.348-375",
"intent": [],
"isInfluential": false,
"paperId": "b5a689bf40ce12745c55a1b470c3a37279d4a446",
"title": "A Comprehensive Study of Deep Learning for Side-Channel Analysis",
"url": "https://www.semanticscholar.org/paper/b5a689bf40ce12745c55a1b470c3a37279d4a446",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2082712147",
"name": "Eloi de Ch\u00e9risey"
}
],
"doi": null,
"intent": [
"methodology",
"background"
],
"isInfluential": false,
"paperId": "c302bbd340bba325296b5b5441bbf077a1f8e232",
"title": "Towards a better formalisation of the side-channel threat. (Vers une meilleure formalisation des attaques par canaux cach\u00e9s)",
"url": "https://www.semanticscholar.org/paper/c302bbd340bba325296b5b5441bbf077a1f8e232",
"venue": "",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "1709.01552",
"authors": [
{
"authorId": "2835874",
"name": "Gorka Irazoqui Apecechea"
},
{
"authorId": "2962388",
"name": "Kai Cong"
},
{
"authorId": "8395388",
"name": "Xiaofei Guo"
},
{
"authorId": "49011688",
"name": "Hareesh Khattri"
},
{
"authorId": "1859231",
"name": "A. Kanuparthi"
},
{
"authorId": "143719440",
"name": "T. Eisenbarth"
},
{
"authorId": "1714383",
"name": "B. Sunar"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "5cf9dc3c6b58191756d2c270077faa40813ff8ca",
"title": "Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries",
"url": "https://www.semanticscholar.org/paper/5cf9dc3c6b58191756d2c270077faa40813ff8ca",
"venue": "ArXiv",
"year": 2017
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "4721512",
"name": "Nicolas Bruneau"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "1bc8267dbe4cf9b536dbb5a39da439543d1167cb",
"title": "Multivariate multitarget high order side-channel attacks",
"url": "https://www.semanticscholar.org/paper/1bc8267dbe4cf9b536dbb5a39da439543d1167cb",
"venue": "",
"year": 2017
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "32780080",
"name": "Oscar Reparaz Dominguez"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "fe8ac1941998639161f01796975fe9d10c85ed0c",
"title": "Analysis and Design of Masking Schemes for Secure Cryptographic Implementations",
"url": "https://www.semanticscholar.org/paper/fe8ac1941998639161f01796975fe9d10c85ed0c",
"venue": "",
"year": 2016
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2084918793",
"name": "H\u00e9l\u00e8ne Le Bouder"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "375bb8b60b05efccf3b6b0ac7597fe34acf774e3",
"title": "UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET RECHERCHER DE NOUVELLES ATTAQUES",
"url": "https://www.semanticscholar.org/paper/375bb8b60b05efccf3b6b0ac7597fe34acf774e3",
"venue": "",
"year": 2014
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "30915493",
"name": "Hiren J. Patel"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "cca96d2f262156840d3f2011cc8b2a2e1d44792b",
"title": "Advances in SCA and RF-DNA Fingerprinting Through Enhanced Linear Regression Attacks and Application of Random Forest Classifiers",
"url": "https://www.semanticscholar.org/paper/cca96d2f262156840d3f2011cc8b2a2e1d44792b",
"venue": "",
"year": 2014
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "10793599",
"name": "Josep Balasch Masoliver"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "6cd903834d7fc556f478964366b09b6458aa3bc0",
"title": "Implementation Aspects of Security and Privacy in Embedded Design (Beveiliging en privacy in ingebedde systemen: implementatieaspecten)",
"url": "https://www.semanticscholar.org/paper/6cd903834d7fc556f478964366b09b6458aa3bc0",
"venue": "",
"year": 2014
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2076746709",
"name": "Yanis Linge"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "1524fade26766f77968ade8d059d7f676fac6d74",
"title": "Etudes cryptographiques et statistiques de signaux compromettants",
"url": "https://www.semanticscholar.org/paper/1524fade26766f77968ade8d059d7f676fac6d74",
"venue": "",
"year": 2013
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1864489",
"name": "Vincent Verneuil"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "46d53b84a525c4e5b12f6ae71537053e0ea6859b",
"title": "Elliptic curve cryptography and security of embedded devices",
"url": "https://www.semanticscholar.org/paper/46d53b84a525c4e5b12f6ae71537053e0ea6859b",
"venue": "",
"year": 2012
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2099058087",
"name": "Vincent Verneuil"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "d73f7a705ad2be7dd4b4455e37127261ae8f03c9",
"title": "Elliptic curve cryptography and security of embedded devices. (Cryptographie \u00e0 base de courbes elliptiques et s\u00e9curit\u00e9 de composants embarqu\u00e9s)",
"url": "https://www.semanticscholar.org/paper/d73f7a705ad2be7dd4b4455e37127261ae8f03c9",
"venue": "",
"year": 2012
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "11025739",
"name": "E. M. Santillan"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "2f3fee63775c070b95652ecac597f79520a1851e",
"title": "Side Channel Analysis of a Java-\u00adbased Contactless Smart Card",
"url": "https://www.semanticscholar.org/paper/2f3fee63775c070b95652ecac597f79520a1851e",
"venue": "",
"year": 2012
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "7937508",
"name": "Maxime Nassar"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "c11815a00a81bd1772d91c775f2688f732e5eab9",
"title": "Low-cost countermeasures against physical attacks on cryptographic algorithms implemented on altera FPGAs",
"url": "https://www.semanticscholar.org/paper/c11815a00a81bd1772d91c775f2688f732e5eab9",
"venue": "",
"year": 2012
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2054398097",
"name": "Shivam Bhasin"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "68b3290ebfb0e1d601489c9f2eb10bdf0bc7d5c4",
"title": "Logic-Level Countermeasures to Secure FPGA based Designs. (Contremesures au niveau logique pour s\u00e9curiser les architectures de crypto-processeurs dans un FPGA)",
"url": "https://www.semanticscholar.org/paper/68b3290ebfb0e1d601489c9f2eb10bdf0bc7d5c4",
"venue": "",
"year": 2011
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2089527",
"name": "Ilya Kizhvatov"
}
],
"doi": null,
"intent": [
"methodology",
"background"
],
"isInfluential": true,
"paperId": "10460799155fc46f33f35c7a5a645892ae4c66cc",
"title": "Physical Security of Cryptographic Algorithm Implementations",
"url": "https://www.semanticscholar.org/paper/10460799155fc46f33f35c7a5a645892ae4c66cc",
"venue": "",
"year": 2011
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2260754847",
"name": "Akria Ito"
},
{
"authorId": "145288869",
"name": "Rei Ueno"
},
{
"authorId": "2260784440",
"name": "Rikuma Tanaka"
},
{
"authorId": "1732991",
"name": "N. Homma"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "695042ff1831b7c279c34fc3cecb20d58ab44de0",
"title": "Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks",
"url": "https://www.semanticscholar.org/paper/695042ff1831b7c279c34fc3cecb20d58ab44de0",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "144689011",
"name": "Arnab Roy"
},
{
"authorId": "2185008875",
"name": "Aakash Chowdhury"
},
{
"authorId": "145944405",
"name": "E. Oswald"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "84c58cc27d04dd3b931a1cc505f653694b922421",
"title": "Consistent, Efficient and Leakage-Model Free Mutual Information Estimation",
"url": "https://www.semanticscholar.org/paper/84c58cc27d04dd3b931a1cc505f653694b922421",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "47391193",
"name": "Yoann Marquer"
},
{
"authorId": "2624371",
"name": "Olivier Zendra"
},
{
"authorId": "2563182",
"name": "Annelie Heuser"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "c42cba9ab130167897ab615f258cb552beeb919b",
"title": "The Indiscernibility Methodology: quantifying information leakage from side-channels with no prior knowledge",
"url": "https://www.semanticscholar.org/paper/c42cba9ab130167897ab615f258cb552beeb919b",
"venue": "",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1977652",
"name": "Rodrigo Abarz\u00faa"
},
{
"authorId": "31634846",
"name": "Claudio Valencia Cordero"
},
{
"authorId": "2322795313",
"name": "Julio L\u00f3pez"
}
],
"doi": null,
"intent": [
"result"
],
"isInfluential": false,
"paperId": "dc8bbcf3abb56f43807846e34060b924d880df46",
"title": "Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC",
"url": "https://www.semanticscholar.org/paper/dc8bbcf3abb56f43807846e34060b924d880df46",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1781371",
"name": "Hugues Thiebeauld"
},
{
"authorId": "31167435",
"name": "Aur\u00e9lien Vasselle"
},
{
"authorId": "2618736",
"name": "Antoine Wurcker"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "558fcf0eaa97ba054a6c6973ee49c278452de9e3",
"title": "Second-order Scatter Attack",
"url": "https://www.semanticscholar.org/paper/558fcf0eaa97ba054a6c6973ee49c278452de9e3",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2325793",
"name": "C. Whitnall"
},
{
"authorId": "145944405",
"name": "E. Oswald"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "b754f4ab5800638df281b0f4d00a95d4a2e189c2",
"title": "A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation",
"url": "https://www.semanticscholar.org/paper/b754f4ab5800638df281b0f4d00a95d4a2e189c2",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1687981",
"name": "Matthieu Rivain"
},
{
"authorId": "2110277131",
"name": "Junwei Wang"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "067d6911a97351047710f1da8f4e070f49abe54a",
"title": "Analysis and Improvement of Differential Computation Attacks against Internally-Encoded WhiteBox Implementations",
"url": "https://www.semanticscholar.org/paper/067d6911a97351047710f1da8f4e070f49abe54a",
"venue": "",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "150111558",
"name": "Gorka Irazoki"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "1b43da8418e4fe2e8af0fb32ae6dfcbcc1b721df",
"title": "Cross-core Microarchitectural Attacks and Countermeasures",
"url": "https://www.semanticscholar.org/paper/1b43da8418e4fe2e8af0fb32ae6dfcbcc1b721df",
"venue": "",
"year": 2017
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2114144788",
"name": "Xin Ye"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "70e1eaf89f62a8bd60f5f6ff9f0ad1b779bd86df",
"title": "Side Channel Leakage Analysis - Detection, Exploitation and Quantification",
"url": "https://www.semanticscholar.org/paper/70e1eaf89f62a8bd60f5f6ff9f0ad1b779bd86df",
"venue": "",
"year": 2015
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2076746709",
"name": "Yanis Linge"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "0b116a1ff8cea5848720143be426c5adc96d9bc9",
"title": "DOCTEUR DE L'UNIVERSIT\u00c9 DE GRENOBLE",
"url": "https://www.semanticscholar.org/paper/0b116a1ff8cea5848720143be426c5adc96d9bc9",
"venue": "",
"year": 2013
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2108462509",
"name": "Jiye Liu"
},
{
"authorId": "1758067",
"name": "Yongbin Zhou"
},
{
"authorId": "1807858",
"name": "Shuguo Yang"
},
{
"authorId": "143677929",
"name": "D. Feng"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "523f00899d93e7325f446694ad54b73b6b03b85a",
"title": "Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation",
"url": "https://www.semanticscholar.org/paper/523f00899d93e7325f446694ad54b73b6b03b85a",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2011
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "40428273",
"name": "S. Bhasin"
},
{
"authorId": "1688300",
"name": "S. Guilley"
},
{
"authorId": "1720215",
"name": "Youssef Souissi"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "d4cbef69eff054d3850de03f13c8e6e688863e52",
"title": "Efficient FPGA Implementation of Dual-Rail Countermeasures using Stochastic Models",
"url": "https://www.semanticscholar.org/paper/d4cbef69eff054d3850de03f13c8e6e688863e52",
"venue": "",
"year": 2011
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "103919711",
"name": "Thijs R. Timmerman"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "26dd0577d98c8547527918820304760ef5cde2ef",
"title": "Mutual Information Analysis for Side Channel Attacks",
"url": "https://www.semanticscholar.org/paper/26dd0577d98c8547527918820304760ef5cde2ef",
"venue": "",
"year": 2011
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "146896483",
"name": "H. Hudde"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "5ca127d1922806fa23eb880d94458326c7f1668c",
"title": "GPU assisted Mutual Information Analysis Attacks on AES",
"url": "https://www.semanticscholar.org/paper/5ca127d1922806fa23eb880d94458326c7f1668c",
"venue": "",
"year": 2010
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2907695",
"name": "Guillaume Fumaroli"
},
{
"authorId": "1684841",
"name": "L. Goubin"
},
{
"authorId": "3023318",
"name": "Sylvain Lachartre"
},
{
"authorId": "39346496",
"name": "Ange Martinelli"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "4f498c9db892f7a3b7d6e42ebfa2aef26637ee7d",
"title": "Towards a Third Order Side Channel Analysis Resistant Table Recomputation Method",
"url": "https://www.semanticscholar.org/paper/4f498c9db892f7a3b7d6e42ebfa2aef26637ee7d",
"venue": "",
"year": 2010
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2247198925",
"name": "Elisabeth Oswald"
},
{
"authorId": "2247209857",
"name": "Stefan Tillich"
},
{
"authorId": "1784270",
"name": "M. Medwed"
},
{
"authorId": "3114610",
"name": "F. Regazzoni"
},
{
"authorId": "1706533",
"name": "Fran\u00e7ois-Xavier Standaert"
},
{
"authorId": "2247191403",
"name": "A. Moradi"
},
{
"authorId": "2247190990",
"name": "C. Paar"
},
{
"authorId": "2325793",
"name": "C. Whitnall"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "720e025be94af0540ab0b03acfff1c8b1b7962ac",
"title": "European Network of Excellence in Cryptology Ii Network of Excellence Information and Communication Technologies Final Report of Vam2 Final Report of Vam2 Editors",
"url": "https://www.semanticscholar.org/paper/720e025be94af0540ab0b03acfff1c8b1b7962ac",
"venue": "",
"year": null
}
WDYT? Is this publication in scope?
URL: http://dx.doi.org/10.1504/IJACT.2010.038306 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1504/ijact.2010.038306