aewag / physical-attack-collection

0 stars 0 forks source link

Pessl_2021 #668

Open aewag opened 1 week ago

aewag commented 1 week ago

WDYT? Is this publication in scope?

@article{Pessl_2021,
 author = {Pessl, Peter and Prokop, Lukas},
 doi = {10.46586/tches.v2021.i2.37-60},
 issn = {2569-2925},
 journal = {IACR Transactions on Cryptographic Hardware and Embedded Systems},
 month = {February},
 pages = {37–60},
 publisher = {Universitatsbibliothek der Ruhr-Universitat Bochum},
 title = {Fault Attacks on CCA-secure Lattice KEMs},
 url = {http://dx.doi.org/10.46586/tches.v2021.i2.37-60},
 year = {2021}
}

URL: http://dx.doi.org/10.46586/tches.v2021.i2.37-60 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.46586/tches.v2021.i2.37-60

aewag commented 1 week ago

Yes

aewag commented 1 week ago

I didnot find DOIs for the following references:

[]

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2011281",
            "name": "Christoph Dobraunig"
        },
        {
            "authorId": "1885627",
            "name": "Maria Eichlseder"
        },
        {
            "authorId": "2795931",
            "name": "Thomas Korak"
        },
        {
            "authorId": "1743786",
            "name": "S. Mangard"
        },
        {
            "authorId": "1908735",
            "name": "Florian Mendel"
        },
        {
            "authorId": "20620000",
            "name": "R. Primas"
        }
    ],
    "doi": "10.13154/tches.v2018.i3.547-572",
    "intent": [],
    "isInfluential": false,
    "paperId": "7feda5e271d9508ff648b6eef16ba691644cc2fd",
    "title": "Exploiting Ineffective Fault Inductions on Symmetric Cryptography",
    "url": "https://www.semanticscholar.org/paper/7feda5e271d9508ff648b6eef16ba691644cc2fd",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1902820",
            "name": "Tobias Oder"
        },
        {
            "authorId": "39704164",
            "name": "Tobias Schneider"
        },
        {
            "authorId": "2672355",
            "name": "T. P\u00f6ppelmann"
        },
        {
            "authorId": "2955750",
            "name": "Tim G\u00fcneysu"
        }
    ],
    "doi": "10.13154/tches.v2018.i1.142-174",
    "intent": [
        "background",
        "methodology"
    ],
    "isInfluential": true,
    "paperId": "86071440cead9a8a69862403cf546a886da6f58b",
    "title": "Practical CCA2-Secure and Masked Ring-LWE Implementation",
    "url": "https://www.semanticscholar.org/paper/86071440cead9a8a69862403cf546a886da6f58b",
    "venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
    "year": 2018
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "NTRU Prime. Submission to the NIST Post-Quantum Cryptography Standardization Project [NIS16], 2019",
    "url": "",
    "venue": "https://ntruprime. cr.yp.to/",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "FrodoKEM",
    "url": "",
    "venue": "",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "CRYSTALS-Kyber: Algorithm specification and supporting documentation (version 2.0). Submission to the NIST Post-Quantum Cryptography Standardization Project",
    "url": "",
    "venue": "",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1484396957",
            "name": "Helen Tera"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "88aa90403026436e64383854fae4fc62cd694c3c",
    "title": "Post-Quantum Cryptography Standardization",
    "url": "https://www.semanticscholar.org/paper/88aa90403026436e64383854fae4fc62cd694c3c",
    "venue": "",
    "year": 2017
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "3364677",
            "name": "L. G. Bruinderink"
        },
        {
            "authorId": "2065868",
            "name": "Andreas H\u00fclsing"
        },
        {
            "authorId": "144337513",
            "name": "T. Lange"
        },
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "bf6b19b03257bc71b39aff83ddce4b6fab1440e5",
    "title": "Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme",
    "url": "https://www.semanticscholar.org/paper/bf6b19b03257bc71b39aff83ddce4b6fab1440e5",
    "venue": "",
    "year": 2016
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1880948",
            "name": "S. Fluhrer"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "c4d8b27280d3f5572bc2817c60ff4913ef05ccb7",
    "title": "Cryptanalysis of ring-LWE based key exchange with key share reuse",
    "url": "https://www.semanticscholar.org/paper/c4d8b27280d3f5572bc2817c60ff4913ef05ccb7",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2016
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "PQM4: Post-quantum crypto library for the ARM Cortex-M4",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "CW308 UFO target",
    "url": "",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Ready for tomorrow : Infineon demonstrates first post - quantum cryptography on a contactless security chip",
    "url": "",
    "venue": "Press Release PQM 4 : Post - quantum crypto library for the ARM Cortex - M 4",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2409.07150",
    "authors": [
        {
            "authorId": "2266468969",
            "name": "Puja Mondal"
        },
        {
            "authorId": "2215149239",
            "name": "Supriya Adhikary"
        },
        {
            "authorId": "2069231851",
            "name": "Suparna Kundu"
        },
        {
            "authorId": "40249582",
            "name": "A. Karmakar"
        }
    ],
    "doi": "10.48550/arXiv.2409.07150",
    "intent": [
        "background",
        "methodology"
    ],
    "isInfluential": true,
    "paperId": "23923c1c18486d0c6da5ff575e85f466719137cf",
    "title": "ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes",
    "url": "https://www.semanticscholar.org/paper/23923c1c18486d0c6da5ff575e85f466719137cf",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2403.01215",
    "authors": [
        {
            "authorId": "2259917520",
            "name": "Kasra Ahmadi"
        },
        {
            "authorId": "2259927016",
            "name": "Saeed Aghapour"
        },
        {
            "authorId": "2287929288",
            "name": "Mehran Mozaffari Kermani"
        },
        {
            "authorId": "1731636",
            "name": "R. Azarderakhsh"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "cae8825ccc554c0ba0ee38fc37fdcacb5acc2d32",
    "title": "Efficient Algorithm Level Error Detection for Number-Theoretic Transform used for Kyber Assessed on FPGAs and ARM",
    "url": "https://www.semanticscholar.org/paper/cae8825ccc554c0ba0ee38fc37fdcacb5acc2d32",
    "venue": "",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2401.14098",
    "authors": [
        {
            "authorId": "2069231851",
            "name": "Suparna Kundu"
        },
        {
            "authorId": "2105636912",
            "name": "Siddhartha Chowdhury"
        },
        {
            "authorId": "1796526",
            "name": "Sayandeep Saha"
        },
        {
            "authorId": "40249582",
            "name": "A. Karmakar"
        },
        {
            "authorId": "1705579",
            "name": "Debdeep Mukhopadhyay"
        },
        {
            "authorId": "2243460775",
            "name": "Ingrid Verbauwhede"
        }
    ],
    "doi": "10.48550/arXiv.2401.14098",
    "intent": [
        "background",
        "methodology"
    ],
    "isInfluential": true,
    "paperId": "3fb3cc6b8601509203356510d06572dba89e3caa",
    "title": "Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM",
    "url": "https://www.semanticscholar.org/paper/3fb3cc6b8601509203356510d06572dba89e3caa",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2311.08027",
    "authors": [
        {
            "authorId": "2266468969",
            "name": "Puja Mondal"
        },
        {
            "authorId": "2069231851",
            "name": "Suparna Kundu"
        },
        {
            "authorId": "2266465320",
            "name": "Sarani Bhattacharya"
        },
        {
            "authorId": "40249582",
            "name": "A. Karmakar"
        },
        {
            "authorId": "2243460775",
            "name": "Ingrid Verbauwhede"
        }
    ],
    "doi": "10.48550/arXiv.2311.08027",
    "intent": [
        "background",
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "72e6ef07c22699b0761bb436a57c88c730566334",
    "title": "A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer",
    "url": "https://www.semanticscholar.org/paper/72e6ef07c22699b0761bb436a57c88c730566334",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2305.13544",
    "authors": [
        {
            "authorId": "2016008175",
            "name": "Alvaro Cintas Canto"
        },
        {
            "authorId": "2077654729",
            "name": "Jasmine Kaur"
        },
        {
            "authorId": "1703366",
            "name": "Mehran Mozaffari Kermani"
        },
        {
            "authorId": "1731636",
            "name": "R. Azarderakhsh"
        }
    ],
    "doi": "10.48550/arXiv.2305.13544",
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "d12e83b32744a85fcc9d13825519f51c901becaa",
    "title": "Algorithmic Security is Insufficient: A Comprehensive Survey on Implementation Attacks Haunting Post-Quantum Security",
    "url": "https://www.semanticscholar.org/paper/d12e83b32744a85fcc9d13825519f51c901becaa",
    "venue": "ArXiv",
    "year": 2023
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": "2204.06153",
    "authors": [
        {
            "authorId": "2109455354",
            "name": "Richa Singh"
        },
        {
            "authorId": "46679177",
            "name": "Saad Islam"
        },
        {
            "authorId": "1714383",
            "name": "B. Sunar"
        },
        {
            "authorId": "1704966",
            "name": "P. Schaumont"
        }
    ],
    "doi": "10.48550/arXiv.2204.06153",
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "7a8ba3359ad93fda837469fec3649971fc879259",
    "title": "An End-to-End Analysis of EMFI on Bit-sliced Post-Quantum Implementations",
    "url": "https://www.semanticscholar.org/paper/7a8ba3359ad93fda837469fec3649971fc879259",
    "venue": "ArXiv",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2121465499",
            "name": "Julius Hermelink"
        },
        {
            "authorId": "81620471",
            "name": "Silvan Streit"
        },
        {
            "authorId": "2083016158",
            "name": "Erik M\u00e5rtensson"
        },
        {
            "authorId": "2313628432",
            "name": "Richard Petri"
        }
    ],
    "doi": null,
    "intent": [
        "background",
        "methodology"
    ],
    "isInfluential": true,
    "paperId": "5dcb2ae01116403bdb114f981da78bd758930bd4",
    "title": "A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems",
    "url": "https://www.semanticscholar.org/paper/5dcb2ae01116403bdb114f981da78bd758930bd4",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2121465499",
            "name": "Julius Hermelink"
        },
        {
            "authorId": "2282166029",
            "name": "Kai-Chun Ning"
        },
        {
            "authorId": "1834564453",
            "name": "Emanuele Strieder"
        }
    ],
    "doi": null,
    "intent": [
        "background",
        "methodology"
    ],
    "isInfluential": true,
    "paperId": "6a7bc8b0601fbeceef92aa79c429f6d981e93fae",
    "title": "The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform",
    "url": "https://www.semanticscholar.org/paper/6a7bc8b0601fbeceef92aa79c429f6d981e93fae",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2282400310",
            "name": "Kexin Qiao"
        },
        {
            "authorId": "2282440451",
            "name": "Siwe Sun"
        },
        {
            "authorId": "2282416179",
            "name": "Zhaoyang Wang"
        },
        {
            "authorId": "2282447755",
            "name": "Zehan Wu"
        },
        {
            "authorId": "2282452150",
            "name": "Junjie Cheng"
        },
        {
            "authorId": "2198541578",
            "name": "An Wang"
        },
        {
            "authorId": "2261252292",
            "name": "Liehuang Zhu"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": true,
    "paperId": "8d7694c0779e9311b19eaaea9bc72ff9ecaa21a6",
    "title": "A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks",
    "url": "https://www.semanticscholar.org/paper/8d7694c0779e9311b19eaaea9bc72ff9ecaa21a6",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2258729439",
            "name": "Jos\u00e9 Bacelar Almeida"
        },
        {
            "authorId": "2265761550",
            "name": "Santiago Arranz Olmos"
        },
        {
            "authorId": "2305535024",
            "name": "Manuel Barbosa"
        },
        {
            "authorId": "2257231143",
            "name": "Gilles Barthe"
        },
        {
            "authorId": "1988409",
            "name": "Fran\u00e7ois Dupressoir"
        },
        {
            "authorId": "2257291250",
            "name": "Benjamin Gr\u00e9goire"
        },
        {
            "authorId": "2101651378",
            "name": "Vincent Laporte"
        },
        {
            "authorId": "3368237",
            "name": "Jean-Christophe L\u00e9chenet"
        },
        {
            "authorId": "2305348157",
            "name": "Cameron Low"
        },
        {
            "authorId": "143722971",
            "name": "Tiago Oliveira"
        },
        {
            "authorId": "49953763",
            "name": "Hugo Pacheco"
        },
        {
            "authorId": "2210083825",
            "name": "Miguel Quaresma"
        },
        {
            "authorId": "2257246382",
            "name": "Peter Schwabe"
        },
        {
            "authorId": "3105882",
            "name": "Pierre-Yves Strub"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "4cce4301e9f7e27d4d26c4dcc5b6f94932bd9eb9",
    "title": "Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt",
    "url": "https://www.semanticscholar.org/paper/4cce4301e9f7e27d4d26c4dcc5b6f94932bd9eb9",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2298207366",
            "name": "Yuxuan Wang"
        },
        {
            "authorId": "2324628738",
            "name": "Jintong Yu"
        },
        {
            "authorId": "2268492727",
            "name": "Shipei Qu"
        },
        {
            "authorId": "2180542081",
            "name": "Xiaolin Zhang"
        },
        {
            "authorId": "2324630384",
            "name": "Xiaowei Li"
        },
        {
            "authorId": "2268564092",
            "name": "Chi Zhang"
        },
        {
            "authorId": "2268492663",
            "name": "Dawu Gu"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "807cd558ab72a329465b6c7c5c4a4d13819b9122",
    "title": "Beware of Keccak: Practical Fault Attacks on SHA-3 to Compromise Kyber and Dilithium on ARM Cortex-M Devices",
    "url": "https://www.semanticscholar.org/paper/807cd558ab72a329465b6c7c5c4a4d13819b9122",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2024
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2327380",
            "name": "L. D. Feo"
        },
        {
            "authorId": "9414644",
            "name": "Nadia El Mrabet"
        },
        {
            "authorId": "40929964",
            "name": "Aymeric Gen\u00eat"
        },
        {
            "authorId": "1506997633",
            "name": "Novak Kaluderovic"
        },
        {
            "authorId": "2117667707",
            "name": "Natacha Linard de Guertechin"
        },
        {
            "authorId": "1957343",
            "name": "S. Ponti\u00e9"
        },
        {
            "authorId": "2111312108",
            "name": "\u00c9lise Tasso"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "0f041e279cec3471b0b6af67f7a3a61b058e61c5",
    "title": "SIKE Channels Zero-Value Side-Channel Attacks on SIKE",
    "url": "https://www.semanticscholar.org/paper/0f041e279cec3471b0b6af67f7a3a61b058e61c5",
    "venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2109455354",
            "name": "Richa Singh"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "2bfffc9cf2a5fbd03fe63cad157c65341c306692",
    "title": "Design and Evaluation of Bit-sliced Neural Network and Post-Quantum Implementations",
    "url": "https://www.semanticscholar.org/paper/2bfffc9cf2a5fbd03fe63cad157c65341c306692",
    "venue": "",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2188739703",
            "name": "Han Wu"
        },
        {
            "authorId": "2118775434",
            "name": "Xiaoyun Wang"
        },
        {
            "authorId": "39051854",
            "name": "Guangwu Xu"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "5e0cfee211079ca47bc4b3e7f193316faf2028ec",
    "title": "Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack",
    "url": "https://www.semanticscholar.org/paper/5e0cfee211079ca47bc4b3e7f193316faf2028ec",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2188739703",
            "name": "Han Wu"
        },
        {
            "authorId": "1710372",
            "name": "Xiaoyun Wang"
        },
        {
            "authorId": "39051854",
            "name": "Guangwu Xu"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "c1098a3f8e60d04dc770247969d4a616ec1a48dd",
    "title": "On the Dual Attack of LWE Schemes in the Presence of Hints",
    "url": "https://www.semanticscholar.org/paper/c1098a3f8e60d04dc770247969d4a616ec1a48dd",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2022
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1961466338",
            "name": "Tendayi Kamucheka"
        },
        {
            "authorId": "11770990",
            "name": "Michael Fahr"
        },
        {
            "authorId": "2111316252",
            "name": "Tristen Teague"
        },
        {
            "authorId": "2111313825",
            "name": "Alexander Nelson"
        },
        {
            "authorId": "2061074144",
            "name": "David Andrews"
        },
        {
            "authorId": "1703659",
            "name": "Miaoqing Huang"
        }
    ],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "0cfd3aa9dfdc232cfa0f9802db72d9d33d4e3c93",
    "title": "Power-based Side Channel Attack Analysis on PQC Algorithms",
    "url": "https://www.semanticscholar.org/paper/0cfd3aa9dfdc232cfa0f9802db72d9d33d4e3c93",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2021
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "34396254",
            "name": "Jeroen Delvaux"
        },
        {
            "authorId": "40282028",
            "name": "Santos Merino Del Pozo"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "0af497e931256d54e76f2d9c7c609c0888b2338a",
    "title": "Roulette: Breaking Kyber with Diverse Fault Injection Setups",
    "url": "https://www.semanticscholar.org/paper/0af497e931256d54e76f2d9c7c609c0888b2338a",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2021
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2061040631",
            "name": "Nimish Mishra"
        },
        {
            "authorId": "2267284104",
            "name": "Debdeep Mukhopadhyay"
        }
    ],
    "doi": null,
    "intent": [
        "background",
        "methodology"
    ],
    "isInfluential": true,
    "paperId": "8b610f7b5bbe1a6f9c216471cae34ea00396e8cf",
    "title": "Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography",
    "url": "https://www.semanticscholar.org/paper/8b610f7b5bbe1a6f9c216471cae34ea00396e8cf",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2276659466",
            "name": "Stone Li"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "4c74d4b0fd1c9422beb19bb3288827e3656b2576",
    "title": "Overview and Discussion of Attacks on CRYSTALS-Kyber",
    "url": "https://www.semanticscholar.org/paper/4c74d4b0fd1c9422beb19bb3288827e3656b2576",
    "venue": "",
    "year": null
}