aewag / physical-attack-collection

0 stars 0 forks source link

Prouff_2010 #2857

Open aewag opened 5 days ago

aewag commented 5 days ago

WDYT? Is this publication in scope?

@article{Prouff_2010,
 author = {Prouff, E. and Rivain, M.},
 doi = {10.1504/ijact.2010.038306},
 issn = {1753-0571},
 journal = {International Journal of Applied Cryptography},
 number = {2},
 pages = {121},
 publisher = {Inderscience Publishers},
 title = {Theoretical and practical aspects of mutual information-based side channel analysis},
 url = {http://dx.doi.org/10.1504/IJACT.2010.038306},
 volume = {2},
 year = {2010}
}

URL: http://dx.doi.org/10.1504/IJACT.2010.038306 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1504/ijact.2010.038306

aewag commented 5 days ago

yes

aewag commented 4 days ago

I didnot find DOIs for the following references:

[]

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2285118740",
            "name": "C. M. Bishop"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "61a1565016477b2092a212e7af0e789a250bc552",
    "title": "Pattern Recognition and Machine Learning (Information Science and Statistics)",
    "url": "https://www.semanticscholar.org/paper/61a1565016477b2092a212e7af0e789a250bc552",
    "venue": "",
    "year": 2006
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1733999",
            "name": "L. Wasserman"
        }
    ],
    "doi": null,
    "intent": [
        "methodology",
        "background"
    ],
    "isInfluential": true,
    "paperId": "b3f8348133c1d2f76f1dc1272f748a0b28874d80",
    "title": "All of Statistics: A Concise Course in Statistical Inference",
    "url": "https://www.semanticscholar.org/paper/b3f8348133c1d2f76f1dc1272f748a0b28874d80",
    "venue": "",
    "year": 2004
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2815158",
            "name": "Hakon Kile"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "4daf05cc2c5e12fef6e69f1d5e412f4368a01729",
    "title": "Bandwidth Selection in Kernel Density Estimation",
    "url": "https://www.semanticscholar.org/paper/4daf05cc2c5e12fef6e69f1d5e412f4368a01729",
    "venue": "",
    "year": 2010
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1706533",
            "name": "Fran\u00e7ois-Xavier Standaert"
        },
        {
            "authorId": "1769717",
            "name": "T. Malkin"
        },
        {
            "authorId": "144068857",
            "name": "M. Yung"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "e41800d9c22503cce7da71f20d44733a0e40cd4a",
    "title": "A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks",
    "url": "https://www.semanticscholar.org/paper/e41800d9c22503cce7da71f20d44733a0e40cd4a",
    "venue": "",
    "year": 2006
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "CRYPTO 1999",
    "url": "",
    "venue": "LNCS, vol. 1666. Springer, Heidelberg",
    "year": 1999
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "46512141",
            "name": "J. Beirlant"
        },
        {
            "authorId": "3147156",
            "name": "E. Dudewicz"
        },
        {
            "authorId": "2087528",
            "name": "L. Gy\u00f6rfi"
        },
        {
            "authorId": "46964079",
            "name": "I. Denes"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "14ba9dccf06355d1c6478b843ccb8f56d7374409",
    "title": "Nonparametric entropy estimation. An overview",
    "url": "https://www.semanticscholar.org/paper/14ba9dccf06355d1c6478b843ccb8f56d7374409",
    "venue": "",
    "year": 1997
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2407.13383",
    "authors": [
        {
            "authorId": "1579007630",
            "name": "Nivedita Shrivastava"
        },
        {
            "authorId": "2550384",
            "name": "S. Sarangi"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "ea6007e56ef562e084b8d85a402b27456b6bb720",
    "title": "NeuroPlug: Plugging Side-Channel Leaks in NPUs using Space Filling Curves",
    "url": "https://www.semanticscholar.org/paper/ea6007e56ef562e084b8d85a402b27456b6bb720",
    "venue": "",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2311.02628",
    "authors": [
        {
            "authorId": "1579007630",
            "name": "Nivedita Shrivastava"
        },
        {
            "authorId": "2550384",
            "name": "S. Sarangi"
        }
    ],
    "doi": "10.48550/arXiv.2311.02628",
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "8f03f195bacd67b350450aa2a793e7b9861afb17",
    "title": "SparseLock: Securing Neural Network Models in Deep Learning Accelerators",
    "url": "https://www.semanticscholar.org/paper/8f03f195bacd67b350450aa2a793e7b9861afb17",
    "venue": "ArXiv",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "46585144",
            "name": "Junwei Wang"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "06a05c5ecdfb9ab6867722752c16b1e8c21361dd",
    "title": "On the practical security of white-box cryptography. (De la th\u00e9orie \u00e0 la pratique de la cryptographie en boite blanche)",
    "url": "https://www.semanticscholar.org/paper/06a05c5ecdfb9ab6867722752c16b1e8c21361dd",
    "venue": "",
    "year": 2020
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "67042729",
            "name": "Lo\u00efc Masure"
        },
        {
            "authorId": "2026534",
            "name": "C\u00e9cile Canovas"
        },
        {
            "authorId": "1726631",
            "name": "E. Prouff"
        }
    ],
    "doi": "10.13154/tches.v2020.i1.348-375",
    "intent": [],
    "isInfluential": false,
    "paperId": "b5a689bf40ce12745c55a1b470c3a37279d4a446",
    "title": "A Comprehensive Study of Deep Learning for Side-Channel Analysis",
    "url": "https://www.semanticscholar.org/paper/b5a689bf40ce12745c55a1b470c3a37279d4a446",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2082712147",
            "name": "Eloi de Ch\u00e9risey"
        }
    ],
    "doi": null,
    "intent": [
        "methodology",
        "background"
    ],
    "isInfluential": false,
    "paperId": "c302bbd340bba325296b5b5441bbf077a1f8e232",
    "title": "Towards a better formalisation of the side-channel threat. (Vers une meilleure formalisation des attaques par canaux cach\u00e9s)",
    "url": "https://www.semanticscholar.org/paper/c302bbd340bba325296b5b5441bbf077a1f8e232",
    "venue": "",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "1709.01552",
    "authors": [
        {
            "authorId": "2835874",
            "name": "Gorka Irazoqui Apecechea"
        },
        {
            "authorId": "2962388",
            "name": "Kai Cong"
        },
        {
            "authorId": "8395388",
            "name": "Xiaofei Guo"
        },
        {
            "authorId": "49011688",
            "name": "Hareesh Khattri"
        },
        {
            "authorId": "1859231",
            "name": "A. Kanuparthi"
        },
        {
            "authorId": "143719440",
            "name": "T. Eisenbarth"
        },
        {
            "authorId": "1714383",
            "name": "B. Sunar"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "5cf9dc3c6b58191756d2c270077faa40813ff8ca",
    "title": "Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries",
    "url": "https://www.semanticscholar.org/paper/5cf9dc3c6b58191756d2c270077faa40813ff8ca",
    "venue": "ArXiv",
    "year": 2017
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "4721512",
            "name": "Nicolas Bruneau"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "1bc8267dbe4cf9b536dbb5a39da439543d1167cb",
    "title": "Multivariate multitarget high order side-channel attacks",
    "url": "https://www.semanticscholar.org/paper/1bc8267dbe4cf9b536dbb5a39da439543d1167cb",
    "venue": "",
    "year": 2017
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "32780080",
            "name": "Oscar Reparaz Dominguez"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "fe8ac1941998639161f01796975fe9d10c85ed0c",
    "title": "Analysis and Design of Masking Schemes for Secure Cryptographic Implementations",
    "url": "https://www.semanticscholar.org/paper/fe8ac1941998639161f01796975fe9d10c85ed0c",
    "venue": "",
    "year": 2016
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2084918793",
            "name": "H\u00e9l\u00e8ne Le Bouder"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "375bb8b60b05efccf3b6b0ac7597fe34acf774e3",
    "title": "UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET RECHERCHER DE NOUVELLES ATTAQUES",
    "url": "https://www.semanticscholar.org/paper/375bb8b60b05efccf3b6b0ac7597fe34acf774e3",
    "venue": "",
    "year": 2014
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "30915493",
            "name": "Hiren J. Patel"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "cca96d2f262156840d3f2011cc8b2a2e1d44792b",
    "title": "Advances in SCA and RF-DNA Fingerprinting Through Enhanced Linear Regression Attacks and Application of Random Forest Classifiers",
    "url": "https://www.semanticscholar.org/paper/cca96d2f262156840d3f2011cc8b2a2e1d44792b",
    "venue": "",
    "year": 2014
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "10793599",
            "name": "Josep Balasch Masoliver"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "6cd903834d7fc556f478964366b09b6458aa3bc0",
    "title": "Implementation Aspects of Security and Privacy in Embedded Design (Beveiliging en privacy in ingebedde systemen: implementatieaspecten)",
    "url": "https://www.semanticscholar.org/paper/6cd903834d7fc556f478964366b09b6458aa3bc0",
    "venue": "",
    "year": 2014
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2076746709",
            "name": "Yanis Linge"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "1524fade26766f77968ade8d059d7f676fac6d74",
    "title": "Etudes cryptographiques et statistiques de signaux compromettants",
    "url": "https://www.semanticscholar.org/paper/1524fade26766f77968ade8d059d7f676fac6d74",
    "venue": "",
    "year": 2013
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1864489",
            "name": "Vincent Verneuil"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "46d53b84a525c4e5b12f6ae71537053e0ea6859b",
    "title": "Elliptic curve cryptography and security of embedded devices",
    "url": "https://www.semanticscholar.org/paper/46d53b84a525c4e5b12f6ae71537053e0ea6859b",
    "venue": "",
    "year": 2012
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2099058087",
            "name": "Vincent Verneuil"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "d73f7a705ad2be7dd4b4455e37127261ae8f03c9",
    "title": "Elliptic curve cryptography and security of embedded devices. (Cryptographie \u00e0 base de courbes elliptiques et s\u00e9curit\u00e9 de composants embarqu\u00e9s)",
    "url": "https://www.semanticscholar.org/paper/d73f7a705ad2be7dd4b4455e37127261ae8f03c9",
    "venue": "",
    "year": 2012
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "11025739",
            "name": "E. M. Santillan"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "2f3fee63775c070b95652ecac597f79520a1851e",
    "title": "Side Channel Analysis of a Java-\u00adbased Contactless Smart Card",
    "url": "https://www.semanticscholar.org/paper/2f3fee63775c070b95652ecac597f79520a1851e",
    "venue": "",
    "year": 2012
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "7937508",
            "name": "Maxime Nassar"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "c11815a00a81bd1772d91c775f2688f732e5eab9",
    "title": "Low-cost countermeasures against physical attacks on cryptographic algorithms implemented on altera FPGAs",
    "url": "https://www.semanticscholar.org/paper/c11815a00a81bd1772d91c775f2688f732e5eab9",
    "venue": "",
    "year": 2012
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2054398097",
            "name": "Shivam Bhasin"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "68b3290ebfb0e1d601489c9f2eb10bdf0bc7d5c4",
    "title": "Logic-Level Countermeasures to Secure FPGA based Designs. (Contremesures au niveau logique pour s\u00e9curiser les architectures de crypto-processeurs dans un FPGA)",
    "url": "https://www.semanticscholar.org/paper/68b3290ebfb0e1d601489c9f2eb10bdf0bc7d5c4",
    "venue": "",
    "year": 2011
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2089527",
            "name": "Ilya Kizhvatov"
        }
    ],
    "doi": null,
    "intent": [
        "methodology",
        "background"
    ],
    "isInfluential": true,
    "paperId": "10460799155fc46f33f35c7a5a645892ae4c66cc",
    "title": "Physical Security of Cryptographic Algorithm Implementations",
    "url": "https://www.semanticscholar.org/paper/10460799155fc46f33f35c7a5a645892ae4c66cc",
    "venue": "",
    "year": 2011
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2260754847",
            "name": "Akria Ito"
        },
        {
            "authorId": "145288869",
            "name": "Rei Ueno"
        },
        {
            "authorId": "2260784440",
            "name": "Rikuma Tanaka"
        },
        {
            "authorId": "1732991",
            "name": "N. Homma"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "695042ff1831b7c279c34fc3cecb20d58ab44de0",
    "title": "Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks",
    "url": "https://www.semanticscholar.org/paper/695042ff1831b7c279c34fc3cecb20d58ab44de0",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "144689011",
            "name": "Arnab Roy"
        },
        {
            "authorId": "2185008875",
            "name": "Aakash Chowdhury"
        },
        {
            "authorId": "145944405",
            "name": "E. Oswald"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "84c58cc27d04dd3b931a1cc505f653694b922421",
    "title": "Consistent, Efficient and Leakage-Model Free Mutual Information Estimation",
    "url": "https://www.semanticscholar.org/paper/84c58cc27d04dd3b931a1cc505f653694b922421",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "47391193",
            "name": "Yoann Marquer"
        },
        {
            "authorId": "2624371",
            "name": "Olivier Zendra"
        },
        {
            "authorId": "2563182",
            "name": "Annelie Heuser"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "c42cba9ab130167897ab615f258cb552beeb919b",
    "title": "The Indiscernibility Methodology: quantifying information leakage from side-channels with no prior knowledge",
    "url": "https://www.semanticscholar.org/paper/c42cba9ab130167897ab615f258cb552beeb919b",
    "venue": "",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1977652",
            "name": "Rodrigo Abarz\u00faa"
        },
        {
            "authorId": "31634846",
            "name": "Claudio Valencia Cordero"
        },
        {
            "authorId": "2322795313",
            "name": "Julio L\u00f3pez"
        }
    ],
    "doi": null,
    "intent": [
        "result"
    ],
    "isInfluential": false,
    "paperId": "dc8bbcf3abb56f43807846e34060b924d880df46",
    "title": "Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC",
    "url": "https://www.semanticscholar.org/paper/dc8bbcf3abb56f43807846e34060b924d880df46",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1781371",
            "name": "Hugues Thiebeauld"
        },
        {
            "authorId": "31167435",
            "name": "Aur\u00e9lien Vasselle"
        },
        {
            "authorId": "2618736",
            "name": "Antoine Wurcker"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "558fcf0eaa97ba054a6c6973ee49c278452de9e3",
    "title": "Second-order Scatter Attack",
    "url": "https://www.semanticscholar.org/paper/558fcf0eaa97ba054a6c6973ee49c278452de9e3",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2325793",
            "name": "C. Whitnall"
        },
        {
            "authorId": "145944405",
            "name": "E. Oswald"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "b754f4ab5800638df281b0f4d00a95d4a2e189c2",
    "title": "A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation",
    "url": "https://www.semanticscholar.org/paper/b754f4ab5800638df281b0f4d00a95d4a2e189c2",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1687981",
            "name": "Matthieu Rivain"
        },
        {
            "authorId": "2110277131",
            "name": "Junwei Wang"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "067d6911a97351047710f1da8f4e070f49abe54a",
    "title": "Analysis and Improvement of Differential Computation Attacks against Internally-Encoded WhiteBox Implementations",
    "url": "https://www.semanticscholar.org/paper/067d6911a97351047710f1da8f4e070f49abe54a",
    "venue": "",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "150111558",
            "name": "Gorka Irazoki"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "1b43da8418e4fe2e8af0fb32ae6dfcbcc1b721df",
    "title": "Cross-core Microarchitectural Attacks and Countermeasures",
    "url": "https://www.semanticscholar.org/paper/1b43da8418e4fe2e8af0fb32ae6dfcbcc1b721df",
    "venue": "",
    "year": 2017
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2114144788",
            "name": "Xin Ye"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "70e1eaf89f62a8bd60f5f6ff9f0ad1b779bd86df",
    "title": "Side Channel Leakage Analysis - Detection, Exploitation and Quantification",
    "url": "https://www.semanticscholar.org/paper/70e1eaf89f62a8bd60f5f6ff9f0ad1b779bd86df",
    "venue": "",
    "year": 2015
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2076746709",
            "name": "Yanis Linge"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "0b116a1ff8cea5848720143be426c5adc96d9bc9",
    "title": "DOCTEUR DE L'UNIVERSIT\u00c9 DE GRENOBLE",
    "url": "https://www.semanticscholar.org/paper/0b116a1ff8cea5848720143be426c5adc96d9bc9",
    "venue": "",
    "year": 2013
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2108462509",
            "name": "Jiye Liu"
        },
        {
            "authorId": "1758067",
            "name": "Yongbin Zhou"
        },
        {
            "authorId": "1807858",
            "name": "Shuguo Yang"
        },
        {
            "authorId": "143677929",
            "name": "D. Feng"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "523f00899d93e7325f446694ad54b73b6b03b85a",
    "title": "Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation",
    "url": "https://www.semanticscholar.org/paper/523f00899d93e7325f446694ad54b73b6b03b85a",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2011
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "40428273",
            "name": "S. Bhasin"
        },
        {
            "authorId": "1688300",
            "name": "S. Guilley"
        },
        {
            "authorId": "1720215",
            "name": "Youssef Souissi"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "d4cbef69eff054d3850de03f13c8e6e688863e52",
    "title": "Efficient FPGA Implementation of Dual-Rail Countermeasures using Stochastic Models",
    "url": "https://www.semanticscholar.org/paper/d4cbef69eff054d3850de03f13c8e6e688863e52",
    "venue": "",
    "year": 2011
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "103919711",
            "name": "Thijs R. Timmerman"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "26dd0577d98c8547527918820304760ef5cde2ef",
    "title": "Mutual Information Analysis for Side Channel Attacks",
    "url": "https://www.semanticscholar.org/paper/26dd0577d98c8547527918820304760ef5cde2ef",
    "venue": "",
    "year": 2011
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "146896483",
            "name": "H. Hudde"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "5ca127d1922806fa23eb880d94458326c7f1668c",
    "title": "GPU assisted Mutual Information Analysis Attacks on AES",
    "url": "https://www.semanticscholar.org/paper/5ca127d1922806fa23eb880d94458326c7f1668c",
    "venue": "",
    "year": 2010
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2907695",
            "name": "Guillaume Fumaroli"
        },
        {
            "authorId": "1684841",
            "name": "L. Goubin"
        },
        {
            "authorId": "3023318",
            "name": "Sylvain Lachartre"
        },
        {
            "authorId": "39346496",
            "name": "Ange Martinelli"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "4f498c9db892f7a3b7d6e42ebfa2aef26637ee7d",
    "title": "Towards a Third Order Side Channel Analysis Resistant Table Recomputation Method",
    "url": "https://www.semanticscholar.org/paper/4f498c9db892f7a3b7d6e42ebfa2aef26637ee7d",
    "venue": "",
    "year": 2010
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2247198925",
            "name": "Elisabeth Oswald"
        },
        {
            "authorId": "2247209857",
            "name": "Stefan Tillich"
        },
        {
            "authorId": "1784270",
            "name": "M. Medwed"
        },
        {
            "authorId": "3114610",
            "name": "F. Regazzoni"
        },
        {
            "authorId": "1706533",
            "name": "Fran\u00e7ois-Xavier Standaert"
        },
        {
            "authorId": "2247191403",
            "name": "A. Moradi"
        },
        {
            "authorId": "2247190990",
            "name": "C. Paar"
        },
        {
            "authorId": "2325793",
            "name": "C. Whitnall"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "720e025be94af0540ab0b03acfff1c8b1b7962ac",
    "title": "European Network of Excellence in Cryptology Ii Network of Excellence Information and Communication Technologies Final Report of Vam2 Final Report of Vam2 Editors",
    "url": "https://www.semanticscholar.org/paper/720e025be94af0540ab0b03acfff1c8b1b7962ac",
    "venue": "",
    "year": null
}