Open aewag opened 1 week ago
Yes
I didnot find DOIs for the following references:
[]
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2011281",
"name": "Christoph Dobraunig"
},
{
"authorId": "1885627",
"name": "Maria Eichlseder"
},
{
"authorId": "2795931",
"name": "Thomas Korak"
},
{
"authorId": "1743786",
"name": "S. Mangard"
},
{
"authorId": "1908735",
"name": "Florian Mendel"
},
{
"authorId": "20620000",
"name": "R. Primas"
}
],
"doi": "10.13154/tches.v2018.i3.547-572",
"intent": [],
"isInfluential": false,
"paperId": "7feda5e271d9508ff648b6eef16ba691644cc2fd",
"title": "Exploiting Ineffective Fault Inductions on Symmetric Cryptography",
"url": "https://www.semanticscholar.org/paper/7feda5e271d9508ff648b6eef16ba691644cc2fd",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1902820",
"name": "Tobias Oder"
},
{
"authorId": "39704164",
"name": "Tobias Schneider"
},
{
"authorId": "2672355",
"name": "T. P\u00f6ppelmann"
},
{
"authorId": "2955750",
"name": "Tim G\u00fcneysu"
}
],
"doi": "10.13154/tches.v2018.i1.142-174",
"intent": [
"background",
"methodology"
],
"isInfluential": true,
"paperId": "86071440cead9a8a69862403cf546a886da6f58b",
"title": "Practical CCA2-Secure and Masked Ring-LWE Implementation",
"url": "https://www.semanticscholar.org/paper/86071440cead9a8a69862403cf546a886da6f58b",
"venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
"year": 2018
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "NTRU Prime. Submission to the NIST Post-Quantum Cryptography Standardization Project [NIS16], 2019",
"url": "",
"venue": "https://ntruprime. cr.yp.to/",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "FrodoKEM",
"url": "",
"venue": "",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "CRYSTALS-Kyber: Algorithm specification and supporting documentation (version 2.0). Submission to the NIST Post-Quantum Cryptography Standardization Project",
"url": "",
"venue": "",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1484396957",
"name": "Helen Tera"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "88aa90403026436e64383854fae4fc62cd694c3c",
"title": "Post-Quantum Cryptography Standardization",
"url": "https://www.semanticscholar.org/paper/88aa90403026436e64383854fae4fc62cd694c3c",
"venue": "",
"year": 2017
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "3364677",
"name": "L. G. Bruinderink"
},
{
"authorId": "2065868",
"name": "Andreas H\u00fclsing"
},
{
"authorId": "144337513",
"name": "T. Lange"
},
{
"authorId": "49968838",
"name": "Y. Yarom"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "bf6b19b03257bc71b39aff83ddce4b6fab1440e5",
"title": "Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme",
"url": "https://www.semanticscholar.org/paper/bf6b19b03257bc71b39aff83ddce4b6fab1440e5",
"venue": "",
"year": 2016
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1880948",
"name": "S. Fluhrer"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "c4d8b27280d3f5572bc2817c60ff4913ef05ccb7",
"title": "Cryptanalysis of ring-LWE based key exchange with key share reuse",
"url": "https://www.semanticscholar.org/paper/c4d8b27280d3f5572bc2817c60ff4913ef05ccb7",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2016
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "PQM4: Post-quantum crypto library for the ARM Cortex-M4",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "CW308 UFO target",
"url": "",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Ready for tomorrow : Infineon demonstrates first post - quantum cryptography on a contactless security chip",
"url": "",
"venue": "Press Release PQM 4 : Post - quantum crypto library for the ARM Cortex - M 4",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2409.07150",
"authors": [
{
"authorId": "2266468969",
"name": "Puja Mondal"
},
{
"authorId": "2215149239",
"name": "Supriya Adhikary"
},
{
"authorId": "2069231851",
"name": "Suparna Kundu"
},
{
"authorId": "40249582",
"name": "A. Karmakar"
}
],
"doi": "10.48550/arXiv.2409.07150",
"intent": [
"background",
"methodology"
],
"isInfluential": true,
"paperId": "23923c1c18486d0c6da5ff575e85f466719137cf",
"title": "ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes",
"url": "https://www.semanticscholar.org/paper/23923c1c18486d0c6da5ff575e85f466719137cf",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2403.01215",
"authors": [
{
"authorId": "2259917520",
"name": "Kasra Ahmadi"
},
{
"authorId": "2259927016",
"name": "Saeed Aghapour"
},
{
"authorId": "2287929288",
"name": "Mehran Mozaffari Kermani"
},
{
"authorId": "1731636",
"name": "R. Azarderakhsh"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "cae8825ccc554c0ba0ee38fc37fdcacb5acc2d32",
"title": "Efficient Algorithm Level Error Detection for Number-Theoretic Transform used for Kyber Assessed on FPGAs and ARM",
"url": "https://www.semanticscholar.org/paper/cae8825ccc554c0ba0ee38fc37fdcacb5acc2d32",
"venue": "",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2401.14098",
"authors": [
{
"authorId": "2069231851",
"name": "Suparna Kundu"
},
{
"authorId": "2105636912",
"name": "Siddhartha Chowdhury"
},
{
"authorId": "1796526",
"name": "Sayandeep Saha"
},
{
"authorId": "40249582",
"name": "A. Karmakar"
},
{
"authorId": "1705579",
"name": "Debdeep Mukhopadhyay"
},
{
"authorId": "2243460775",
"name": "Ingrid Verbauwhede"
}
],
"doi": "10.48550/arXiv.2401.14098",
"intent": [
"background",
"methodology"
],
"isInfluential": true,
"paperId": "3fb3cc6b8601509203356510d06572dba89e3caa",
"title": "Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM",
"url": "https://www.semanticscholar.org/paper/3fb3cc6b8601509203356510d06572dba89e3caa",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2311.08027",
"authors": [
{
"authorId": "2266468969",
"name": "Puja Mondal"
},
{
"authorId": "2069231851",
"name": "Suparna Kundu"
},
{
"authorId": "2266465320",
"name": "Sarani Bhattacharya"
},
{
"authorId": "40249582",
"name": "A. Karmakar"
},
{
"authorId": "2243460775",
"name": "Ingrid Verbauwhede"
}
],
"doi": "10.48550/arXiv.2311.08027",
"intent": [
"background",
"methodology"
],
"isInfluential": false,
"paperId": "72e6ef07c22699b0761bb436a57c88c730566334",
"title": "A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer",
"url": "https://www.semanticscholar.org/paper/72e6ef07c22699b0761bb436a57c88c730566334",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2305.13544",
"authors": [
{
"authorId": "2016008175",
"name": "Alvaro Cintas Canto"
},
{
"authorId": "2077654729",
"name": "Jasmine Kaur"
},
{
"authorId": "1703366",
"name": "Mehran Mozaffari Kermani"
},
{
"authorId": "1731636",
"name": "R. Azarderakhsh"
}
],
"doi": "10.48550/arXiv.2305.13544",
"intent": [
"background"
],
"isInfluential": false,
"paperId": "d12e83b32744a85fcc9d13825519f51c901becaa",
"title": "Algorithmic Security is Insufficient: A Comprehensive Survey on Implementation Attacks Haunting Post-Quantum Security",
"url": "https://www.semanticscholar.org/paper/d12e83b32744a85fcc9d13825519f51c901becaa",
"venue": "ArXiv",
"year": 2023
}
I failed to append the following reference to the review pipeline:
{
"arxivId": "2204.06153",
"authors": [
{
"authorId": "2109455354",
"name": "Richa Singh"
},
{
"authorId": "46679177",
"name": "Saad Islam"
},
{
"authorId": "1714383",
"name": "B. Sunar"
},
{
"authorId": "1704966",
"name": "P. Schaumont"
}
],
"doi": "10.48550/arXiv.2204.06153",
"intent": [
"background"
],
"isInfluential": false,
"paperId": "7a8ba3359ad93fda837469fec3649971fc879259",
"title": "An End-to-End Analysis of EMFI on Bit-sliced Post-Quantum Implementations",
"url": "https://www.semanticscholar.org/paper/7a8ba3359ad93fda837469fec3649971fc879259",
"venue": "ArXiv",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2121465499",
"name": "Julius Hermelink"
},
{
"authorId": "81620471",
"name": "Silvan Streit"
},
{
"authorId": "2083016158",
"name": "Erik M\u00e5rtensson"
},
{
"authorId": "2313628432",
"name": "Richard Petri"
}
],
"doi": null,
"intent": [
"background",
"methodology"
],
"isInfluential": true,
"paperId": "5dcb2ae01116403bdb114f981da78bd758930bd4",
"title": "A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems",
"url": "https://www.semanticscholar.org/paper/5dcb2ae01116403bdb114f981da78bd758930bd4",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2121465499",
"name": "Julius Hermelink"
},
{
"authorId": "2282166029",
"name": "Kai-Chun Ning"
},
{
"authorId": "1834564453",
"name": "Emanuele Strieder"
}
],
"doi": null,
"intent": [
"background",
"methodology"
],
"isInfluential": true,
"paperId": "6a7bc8b0601fbeceef92aa79c429f6d981e93fae",
"title": "The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform",
"url": "https://www.semanticscholar.org/paper/6a7bc8b0601fbeceef92aa79c429f6d981e93fae",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2282400310",
"name": "Kexin Qiao"
},
{
"authorId": "2282440451",
"name": "Siwe Sun"
},
{
"authorId": "2282416179",
"name": "Zhaoyang Wang"
},
{
"authorId": "2282447755",
"name": "Zehan Wu"
},
{
"authorId": "2282452150",
"name": "Junjie Cheng"
},
{
"authorId": "2198541578",
"name": "An Wang"
},
{
"authorId": "2261252292",
"name": "Liehuang Zhu"
}
],
"doi": null,
"intent": [],
"isInfluential": true,
"paperId": "8d7694c0779e9311b19eaaea9bc72ff9ecaa21a6",
"title": "A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks",
"url": "https://www.semanticscholar.org/paper/8d7694c0779e9311b19eaaea9bc72ff9ecaa21a6",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2258729439",
"name": "Jos\u00e9 Bacelar Almeida"
},
{
"authorId": "2265761550",
"name": "Santiago Arranz Olmos"
},
{
"authorId": "2305535024",
"name": "Manuel Barbosa"
},
{
"authorId": "2257231143",
"name": "Gilles Barthe"
},
{
"authorId": "1988409",
"name": "Fran\u00e7ois Dupressoir"
},
{
"authorId": "2257291250",
"name": "Benjamin Gr\u00e9goire"
},
{
"authorId": "2101651378",
"name": "Vincent Laporte"
},
{
"authorId": "3368237",
"name": "Jean-Christophe L\u00e9chenet"
},
{
"authorId": "2305348157",
"name": "Cameron Low"
},
{
"authorId": "143722971",
"name": "Tiago Oliveira"
},
{
"authorId": "49953763",
"name": "Hugo Pacheco"
},
{
"authorId": "2210083825",
"name": "Miguel Quaresma"
},
{
"authorId": "2257246382",
"name": "Peter Schwabe"
},
{
"authorId": "3105882",
"name": "Pierre-Yves Strub"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "4cce4301e9f7e27d4d26c4dcc5b6f94932bd9eb9",
"title": "Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt",
"url": "https://www.semanticscholar.org/paper/4cce4301e9f7e27d4d26c4dcc5b6f94932bd9eb9",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2298207366",
"name": "Yuxuan Wang"
},
{
"authorId": "2324628738",
"name": "Jintong Yu"
},
{
"authorId": "2268492727",
"name": "Shipei Qu"
},
{
"authorId": "2180542081",
"name": "Xiaolin Zhang"
},
{
"authorId": "2324630384",
"name": "Xiaowei Li"
},
{
"authorId": "2268564092",
"name": "Chi Zhang"
},
{
"authorId": "2268492663",
"name": "Dawu Gu"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "807cd558ab72a329465b6c7c5c4a4d13819b9122",
"title": "Beware of Keccak: Practical Fault Attacks on SHA-3 to Compromise Kyber and Dilithium on ARM Cortex-M Devices",
"url": "https://www.semanticscholar.org/paper/807cd558ab72a329465b6c7c5c4a4d13819b9122",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2024
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2327380",
"name": "L. D. Feo"
},
{
"authorId": "9414644",
"name": "Nadia El Mrabet"
},
{
"authorId": "40929964",
"name": "Aymeric Gen\u00eat"
},
{
"authorId": "1506997633",
"name": "Novak Kaluderovic"
},
{
"authorId": "2117667707",
"name": "Natacha Linard de Guertechin"
},
{
"authorId": "1957343",
"name": "S. Ponti\u00e9"
},
{
"authorId": "2111312108",
"name": "\u00c9lise Tasso"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "0f041e279cec3471b0b6af67f7a3a61b058e61c5",
"title": "SIKE Channels Zero-Value Side-Channel Attacks on SIKE",
"url": "https://www.semanticscholar.org/paper/0f041e279cec3471b0b6af67f7a3a61b058e61c5",
"venue": "IACR Trans. Cryptogr. Hardw. Embed. Syst.",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2109455354",
"name": "Richa Singh"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "2bfffc9cf2a5fbd03fe63cad157c65341c306692",
"title": "Design and Evaluation of Bit-sliced Neural Network and Post-Quantum Implementations",
"url": "https://www.semanticscholar.org/paper/2bfffc9cf2a5fbd03fe63cad157c65341c306692",
"venue": "",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2188739703",
"name": "Han Wu"
},
{
"authorId": "2118775434",
"name": "Xiaoyun Wang"
},
{
"authorId": "39051854",
"name": "Guangwu Xu"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "5e0cfee211079ca47bc4b3e7f193316faf2028ec",
"title": "Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack",
"url": "https://www.semanticscholar.org/paper/5e0cfee211079ca47bc4b3e7f193316faf2028ec",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2188739703",
"name": "Han Wu"
},
{
"authorId": "1710372",
"name": "Xiaoyun Wang"
},
{
"authorId": "39051854",
"name": "Guangwu Xu"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "c1098a3f8e60d04dc770247969d4a616ec1a48dd",
"title": "On the Dual Attack of LWE Schemes in the Presence of Hints",
"url": "https://www.semanticscholar.org/paper/c1098a3f8e60d04dc770247969d4a616ec1a48dd",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2022
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1961466338",
"name": "Tendayi Kamucheka"
},
{
"authorId": "11770990",
"name": "Michael Fahr"
},
{
"authorId": "2111316252",
"name": "Tristen Teague"
},
{
"authorId": "2111313825",
"name": "Alexander Nelson"
},
{
"authorId": "2061074144",
"name": "David Andrews"
},
{
"authorId": "1703659",
"name": "Miaoqing Huang"
}
],
"doi": null,
"intent": [
"methodology"
],
"isInfluential": false,
"paperId": "0cfd3aa9dfdc232cfa0f9802db72d9d33d4e3c93",
"title": "Power-based Side Channel Attack Analysis on PQC Algorithms",
"url": "https://www.semanticscholar.org/paper/0cfd3aa9dfdc232cfa0f9802db72d9d33d4e3c93",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2021
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "34396254",
"name": "Jeroen Delvaux"
},
{
"authorId": "40282028",
"name": "Santos Merino Del Pozo"
}
],
"doi": null,
"intent": [
"background"
],
"isInfluential": false,
"paperId": "0af497e931256d54e76f2d9c7c609c0888b2338a",
"title": "Roulette: Breaking Kyber with Diverse Fault Injection Setups",
"url": "https://www.semanticscholar.org/paper/0af497e931256d54e76f2d9c7c609c0888b2338a",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2021
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2061040631",
"name": "Nimish Mishra"
},
{
"authorId": "2267284104",
"name": "Debdeep Mukhopadhyay"
}
],
"doi": null,
"intent": [
"background",
"methodology"
],
"isInfluential": true,
"paperId": "8b610f7b5bbe1a6f9c216471cae34ea00396e8cf",
"title": "Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography",
"url": "https://www.semanticscholar.org/paper/8b610f7b5bbe1a6f9c216471cae34ea00396e8cf",
"venue": "",
"year": null
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "2276659466",
"name": "Stone Li"
}
],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "4c74d4b0fd1c9422beb19bb3288827e3656b2576",
"title": "Overview and Discussion of Attacks on CRYSTALS-Kyber",
"url": "https://www.semanticscholar.org/paper/4c74d4b0fd1c9422beb19bb3288827e3656b2576",
"venue": "",
"year": null
}
WDYT? Is this publication in scope?
URL: http://dx.doi.org/10.46586/tches.v2021.i2.37-60 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.46586/tches.v2021.i2.37-60