{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:58:43Z","timestamp":1743055123837,"version":"3.40.3"},"publisher-location":"Cham","reference-count":78,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030884277"},{"type":"electronic","value":"9783030884284"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88428-4_12","type":"book-chapter","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T06:03:11Z","timestamp":1633068191000},"page":"235-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4225-487X","authenticated-orcid":false,"given":"Alexandra","family":"Weber","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2861-1957","authenticated-orcid":false,"given":"Oleg","family":"Nikiforov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1213-9267","authenticated-orcid":false,"given":"Alexander","family":"Sauer","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Schickel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4676-0024","authenticated-orcid":false,"given":"Gernot","family":"Alber","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6586-5529","authenticated-orcid":false,"given":"Heiko","family":"Mantel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8114-1785","authenticated-orcid":false,"given":"Thomas","family":"Walther","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,2]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/11935308_9","volume-title":"Information and Communications Security","author":"O Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K.: Trace-driven cache attacks on AES (short paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 112\u2013121. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11935308_9"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ali, M., Rau, A.R.P., Alber, G.: Quantum discord for two-qubit $$X$$ states. Phys. Rev. A 81(4), 042105-1\u2013042105-7 (2010)","DOI":"10.1103\/PhysRevA.81.042105"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Smith, G.: Measuring information leakage using generalized gain functions. In: CSF, pp. 265\u2013279 (2012)","DOI":"10.1109\/CSF.2012.26"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Am\u00e9rico, A., Malacaria, P.: QQIF: quantum quantitative information flow (invited paper). In: HotSpot, pp. 1\u201310 (2020)","DOI":"10.1109\/EuroSPW51379.2020.00042"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Baldi, M., Bianchi, M., Maturo, N., Chiaraluce, F.: Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes. In: ISCC, pp. 000197\u2013000202 (2013)","DOI":"10.1109\/ISCC.2013.6754945"},{"key":"12_CR6","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: CSSP, pp. 175\u2013179 (1984)"},{"key":"12_CR7","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES. Technical report, University of Illinois (2005)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-319-75650-9_15","volume-title":"Foundations and Practice of Security","author":"N Bindel","year":"2018","unstructured":"Bindel, N., Buchmann, J., Kr\u00e4mer, J., Mantel, H., Schickel, J., Weber, A.: Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics. In: Imine, A., Fernandez, J.M., Marion, J.-Y., Logrippo, L., Garcia-Alfaro, J. (eds.) FPS 2017. LNCS, vol. 10723, pp. 225\u2013241. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75650-9_15"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/3-540-48285-7_35","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201993","author":"G Brassard","year":"1994","unstructured":"Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 410\u2013423. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48285-7_35"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Brotzman, R.L., Liu, S.L., Zhang, D., Tan, G., Kandemir, M.T.: CaSym: cache aware symbolic execution for side channel detection and mitigation. In: S&P, pp. 505\u2013521 (2018)","DOI":"10.1109\/SP.2019.00022"},{"key":"12_CR11","unstructured":"Cho, J.Y., Szyrkowiec, T., Griesser, H.: Quantum key distribution as a service. In: QCrypt, pp. 1\u20133 (2017)"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1007\/978-3-642-39799-8_47","volume-title":"Computer Aided Verification","author":"T Chothia","year":"2013","unstructured":"Chothia, T., Kawamoto, Y., Novakovic, C.: A tool for estimating information leakage. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 690\u2013695. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_47"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-319-11212-1_13","volume-title":"Computer Security - ESORICS 2014","author":"T Chothia","year":"2014","unstructured":"Chothia, T., Kawamoto, Y., Novakovic, C.: LeakWatch: estimating information leakage from Java programs. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 219\u2013236. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11212-1_13"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Cock, D., Ge, Q., Murray, T., Heiser, G.: The last mile: an empirical study of timing channels on seL4. In: CCS, pp. 570\u2013581 (2014)","DOI":"10.1145\/2660267.2660294"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: POPL, pp. 238\u2013252 (1977)","DOI":"10.1145\/512950.512973"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-319-66402-6_25","volume-title":"Computer Security \u2013 ESORICS 2017","author":"F Dewald","year":"2017","unstructured":"Dewald, F., Mantel, H., Weber, A.: AVR processors as a platform for language-based security. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 427\u2013445. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66402-6_25"},{"issue":"1","key":"12_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/npjqi.2016.25","volume":"2","author":"E Diamanti","year":"2016","unstructured":"Diamanti, E., Lo, H.K., Qi, B., Yuan, Z.: Practical challenges in quantum key distribution. NPJ Quantum Inf. 2(1), 1\u201312 (2016)","journal-title":"NPJ Quantum Inf."},{"issue":"7275","key":"12_CR18","first-page":"1","volume":"4","author":"AR Dixon","year":"2014","unstructured":"Dixon, A.R., Sato, H.: High speed and adaptable error correction for megabit\/s rate quantum key distribution. Sci. Rep. 4(7275), 1\u20136 (2014)","journal-title":"Sci. Rep."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Doychev, G., K\u00f6pf, B.: Rigorous analysis of software countermeasures against cache attacks. In: PLDI, pp. 406\u2013421 (2017)","DOI":"10.1145\/3140587.3062388"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Doychev, G., K\u00f6pf, B., Mauborgne, L., Reineke, J.: CacheAudit: a tool for the static analysis of cache side channels. ACM Trans. Inf. Syst. Secur. 18(1), 4:1\u20134:32 (2015)","DOI":"10.1145\/2756550"},{"issue":"6","key":"12_CR21","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Elkouss, D., Leverrier, A., All\u00e9aume, R., Boutros, J.H.: Efficient reconciliation protocol for discrete-variable quantum key distribution. In: ISIT, pp. 1879\u20131883 (2009)","DOI":"10.1109\/ISIT.2009.5205475"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Euler, S., Beier, M., Sinther, M., Walther, T.: Spontaneous parametric down-conversion in waveguide chips for quantum information. In: AIP Conference Proceedings, vol. 1363, no. 1, pp. 323\u2013326 (2011)","DOI":"10.1063\/1.3630204"},{"key":"12_CR24","unstructured":"Fardan, N.J.A., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: S&P, pp. 526\u2013540 (2013)"},{"key":"12_CR25","unstructured":"Fraunhofer HHI: Fraunhofer HHI participates in major initiative for Quantum Communication supported by German Federal Ministry of Education and Research (2019). https:\/\/www.hhi.fraunhofer.de\/en\/press-media\/news\/2019\/fraunhofer-hhi-participates-in-major-initiative-for-quantum-communication-supported-by-german-federal-ministry-of-education-and-research.html. Accessed 30 Sept 2020"},{"issue":"6","key":"12_CR26","doi-asserted-by":"publisher","first-page":"4381","DOI":"10.1103\/PhysRevA.52.4381","volume":"52","author":"ES Fry","year":"1995","unstructured":"Fry, E.S., Walther, T., Li, S.: Proposal for a loophole-free test of the Bell inequalities. Phys. Rev. A 52(6), 4381\u20134395 (1995)","journal-title":"Phys. Rev. A"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Fung, C.H.F., Qi, B., Tamaki, K., Lo, H.K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75(3), 032314-1\u2013032314-12 (2007)","DOI":"10.1103\/PhysRevA.75.032314"},{"issue":"1","key":"12_CR28","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"8","author":"R Gallager","year":"1962","unstructured":"Gallager, R.: Low-density parity-check codes. IRE Trans. Inf. Theory 8(1), 21\u201328 (1962)","journal-title":"IRE Trans. Inf. Theory"},{"issue":"8795","key":"12_CR29","first-page":"1","volume":"6","author":"T Gehring","year":"2015","unstructured":"Gehring, T., et al.: Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks. Nat. Commun. 6(8795), 1\u20137 (2015)","journal-title":"Nat. Commun."},{"issue":"1","key":"12_CR30","first-page":"19","volume":"6","author":"M Geihs","year":"2021","unstructured":"Geihs, M., et al.: The status of quantum-key-distribution-based long-term secure Internet communication. IEEE T-SUSC 6(1), 19\u201329 (2021)","journal-title":"IEEE T-SUSC"},{"issue":"1","key":"12_CR31","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"12_CR32","unstructured":"GitHub Inc: Forks of radfordneal\/LDPC-codes (2019). https:\/\/github.com\/radfordneal\/LDPC-codes\/network\/members. Accessed 30 Sept 2020"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Gullasch, D., Bangerter, E., Krenn, S.: Cache games - bringing access-based cache attacks on AES to practice. In: S&P, pp. 490\u2013505 (2011)","DOI":"10.1109\/SP.2011.22"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Hui, C., Wang, Y., Lu, X.: Implementation of a high throughput LDPC codec in FPGA for QKD system. In: ICSICT, pp. 1494\u20131496 (2016)","DOI":"10.1109\/ICSICT.2016.7998780"},{"key":"12_CR35","unstructured":"IEEE Computer Society: IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Amendment 5: Enhancements for Higher Throughput. Technical report. IEEE Std 802.11n-2009, IEEE (2009)"},{"key":"12_CR36","unstructured":"Institute for Quantum Optics and Quantum Information, Austrian Academy of Sciences: QUAPITAL: Building the first reliable Quantum Internet on top of Europe\u2019s glass fiber network (2020). https:\/\/quapital.eu\/. Accessed 30 Sept 2020"},{"key":"12_CR37","unstructured":"Intel Corporation: Intel\u00ae 64 and IA-32 Software Developer\u2019s Manual. Order Number: 325462\u2013069US (2019)"},{"issue":"5","key":"12_CR38","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/nphoton.2013.63","volume":"7","author":"P Jouguet","year":"2013","unstructured":"Jouguet, P., Kunz-Jacques, S., Leverrier, A., Grangier, P., Diamanti, E.: Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 7(5), 378\u2013381 (2013)","journal-title":"Nat. Photonics"},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: S&P, pp. 1\u201319 (2019)","DOI":"10.1109\/SP.2019.00002"},{"key":"12_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/978-3-642-31424-7_40","volume-title":"Computer Aided Verification","author":"B K\u00f6pf","year":"2012","unstructured":"K\u00f6pf, B., Mauborgne, L., Ochoa, M.: Automatic quantification of cache side-channels. In: Madhusudan, P., Seshia, S.A. (eds.) CAV 2012. LNCS, vol. 7358, pp. 564\u2013580. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31424-7_40"},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Smith, G.: Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: CSF, pp. 44\u201356 (2010)","DOI":"10.1109\/CSF.2010.11"},{"key":"12_CR42","unstructured":"Laser and Quantum Optics group (LQO) at TU Darmstadt: Open source software for control of the quantum key distribution and its postprocessing (2020). https:\/\/git.rwth-aachen.de\/oleg.nikiforov\/qkd-tools. Accessed 07 Sept 2020"},{"key":"12_CR43","unstructured":"Lipp, M., Gruss, D., Spreitzer, R., Maurice, C., Mangard, S.: ARMageddon: cache attacks on mobile devices. In: USENIX Security, pp. 549\u2013564 (2016)"},{"key":"12_CR44","unstructured":"Lipp, M., et al.: Meltdown: reading kernel memory from user space. In: USENIX Security, pp. 973\u2013990 (2018)"},{"issue":"10","key":"12_CR45","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4(10), 686\u2013689 (2010)","journal-title":"Nat. Photonics"},{"issue":"18","key":"12_CR46","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1049\/el:19961141","volume":"32","author":"DJC MacKay","year":"1996","unstructured":"MacKay, D.J.C., Neal, R.M.: Near Shannon limit performance of low density parity check codes. Electron. Lett. 32(18), 1645\u20131646 (1996)","journal-title":"Electron. Lett."},{"issue":"5","key":"12_CR47","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1080\/09500340410001730986","volume":"52","author":"V Makarov","year":"2005","unstructured":"Makarov, V., Hjelme, D.R.: Faked states attack on quantum cryptosystems. J. Mod. Opt. 52(5), 691\u2013705 (2005)","journal-title":"J. Mod. Opt."},{"key":"12_CR48","doi-asserted-by":"crossref","unstructured":"Malacaria, P., Khouzani, M., Pasareanu, C.S., Phan, Q., Luckow, K.S.: Symbolic side-channel analysis for probabilistic programs. In: CSF, pp. 313\u2013327 (2018)","DOI":"10.1109\/CSF.2018.00030"},{"key":"12_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-99073-6_11","volume-title":"Computer Security","author":"H Mantel","year":"2018","unstructured":"Mantel, H., Schickel, J., Weber, A., Weber, F.: How secure is green IT? The case of software-based energy side channels. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 218\u2013239. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99073-6_11"},{"key":"12_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/978-3-319-24174-6_23","volume-title":"Computer Security \u2013 ESORICS 2015","author":"H Mantel","year":"2015","unstructured":"Mantel, H., Starostin, A.: Transforming out timing leaks, more or less. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 447\u2013467. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24174-6_23"},{"key":"12_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-62105-0_14","volume-title":"Engineering Secure Software and Systems","author":"H Mantel","year":"2017","unstructured":"Mantel, H., Weber, A., K\u00f6pf, B.: A systematic study of cache side channels across AES implementations. In: Bodden, E., Payer, M., Athanasopoulos, E. (eds.) ESSoS 2017. LNCS, vol. 10379, pp. 213\u2013230. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-62105-0_14"},{"issue":"21","key":"12_CR52","first-page":"1","volume":"4","author":"M Milicevic","year":"2018","unstructured":"Milicevic, M., Feng, C., Zhang, L.M., Gulak, P.G.: Quasi-cyclic multi-edge LDPC codes for long-distance quantum cryptography. NPJ Quantum Inf. 4(21), 1\u20139 (2018)","journal-title":"NPJ Quantum Inf."},{"key":"12_CR53","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-030-36365-9_4","volume-title":"Advances in Data Science, Cyber Security and IT Applications","author":"OKJ Mohammad","year":"2019","unstructured":"Mohammad, O.K.J., Abbas, S.: Detailed quantum cryptographic service and data security in cloud computing. In: Alfaries, A., Mengash, H., Yasar, A., Shakshuki, E. (eds.) ICC 2019. CCIS, vol. 1097, pp. 43\u201356. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36365-9_4"},{"key":"12_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/11734727_14","volume-title":"Information Security and Cryptology - ICISC 2005","author":"D Molnar","year":"2006","unstructured":"Molnar, D., Piotrowski, M., Schultz, D., Wagner, D.: The program counter security model: automatic detection and removal of control-flow side channel attacks. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 156\u2013168. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11734727_14"},{"key":"12_CR55","unstructured":"Neal, R.M.: Software for Low Density Parity Check Codes, Version 2012\u201302-11 (2012). http:\/\/www.cs.utoronto.ca\/~radford\/ftp\/LDPC-2012-02-11\/. Accessed 20 Sept 2020"},{"key":"12_CR56","volume-title":"Quantum Computation and Quantum Information: 10th Anniversary Edition","author":"MA Nielsen","year":"2011","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press, New York (2011)"},{"key":"12_CR57","unstructured":"Notz, P., Nikiforov, O., Walther, T.: Software bundle for data post-processing in a quantum key distribution experiment. Technical report, TU Darmstadt (2020)"},{"key":"12_CR58","doi-asserted-by":"crossref","unstructured":"Ollivier, H., Zurek, W.H.: Quantum discord: a measure of the quantumness of correlations. Phys. Rev. Lett. 88(1), 017901-1\u2013017901-4 (2002)","DOI":"10.1103\/PhysRevLett.88.017901"},{"key":"12_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11605805_1"},{"key":"12_CR60","unstructured":"Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive 2002(169), 1\u201323 (2002)"},{"key":"12_CR61","doi-asserted-by":"crossref","unstructured":"Pearson, D.: High-speed QKD reconciliation using forward error correction. In: AIP Conference Proceedings, vol. 734, no. 1, pp. 299\u2013302 (2004)","DOI":"10.1063\/1.1834439"},{"key":"12_CR62","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-24586-2_13","volume-title":"Security Aspects in Information Technology","author":"R Poddar","year":"2011","unstructured":"Poddar, R., Datta, A., Rebeiro, C.: A cache trace attack on CAMELLIA. In: Joye, M., Mukhopadhyay, D., Tunstall, M. (eds.) InfoSecHiComNet 2011. LNCS, vol. 7011, pp. 144\u2013156. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24586-2_13"},{"issue":"1","key":"12_CR63","first-page":"73","volume":"7","author":"B Qi","year":"2006","unstructured":"Qi, B., Fung, C.H.F., Lo, H.K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7(1), 73\u201382 (2006)","journal-title":"Quantum Inf. Comput."},{"key":"12_CR64","unstructured":"Rebeiro, C., Mukhopadhyay, D.: Differential cache trace attack against clefia. IACR Cryptology ePrint Archive 2010(012), 1\u201311 (2010)"},{"key":"12_CR65","unstructured":"Renner, R.: Security of quantum key distribution. Ph.D. thesis, Swiss Federal Institute of Technology Zurich (2005)"},{"key":"12_CR66","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS, pp. 199\u2013212 (2009)","DOI":"10.1145\/1653662.1653687"},{"issue":"11","key":"12_CR67","doi-asserted-by":"publisher","first-page":"10387","DOI":"10.1364\/OE.19.010387","volume":"19","author":"M Sasaki","year":"2011","unstructured":"Sasaki, M., et al.: Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19(11), 10387\u201310409 (2011)","journal-title":"Opt. Express"},{"key":"12_CR68","doi-asserted-by":"crossref","unstructured":"Schmitt-Manderbach, T., et al.: Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys. Rev. Lett. 98(1), 010504-1\u2013010504\u20134 (2007)","DOI":"10.1103\/PhysRevLett.98.010504"},{"key":"12_CR69","doi-asserted-by":"crossref","unstructured":"Schwarz, M., et al.: KeyDrown: eliminating software-based keystroke timing side-channel attacks. In: NDSS, pp. 1\u201315 (2018)","DOI":"10.14722\/ndss.2018.23027"},{"key":"12_CR70","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G Smith","year":"2009","unstructured":"Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FoSSaCS 2009. LNCS, vol. 5504, pp. 288\u2013302. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00596-1_21"},{"issue":"1","key":"12_CR71","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/COMST.2017.2779824","volume":"20","author":"R Spreitzer","year":"2018","unstructured":"Spreitzer, R., Moonsamy, V., Korak, T., Mangard, S.: Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun. Surv. Tutor. 20(1), 465\u2013488 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"12_CR72","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/JSTQE.2014.2364131","volume":"21","author":"G Vest","year":"2015","unstructured":"Vest, G., et al.: Design and evaluation of a handheld quantum key distribution sender module. IEEE J. Sel. Top. Quantum Electron. 21(3), 131\u2013137 (2015)","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"issue":"013047","key":"12_CR73","first-page":"1","volume":"16","author":"N Walenta","year":"2014","unstructured":"Walenta, N., et al.: A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing. New J. Phys. 16(013047), 1\u201320 (2014)","journal-title":"New J. Phys."},{"key":"12_CR74","unstructured":"Wang, S., Wang, P., Liu, X., Zhang, D., Wu, D.: CacheD: identifying cache-based timing channels in production software. In: USENIX Security, pp. 235\u2013252 (2017)"},{"key":"12_CR75","unstructured":"Weiser, S., Zankl, A., Spreitzer, R., Miller, K., Mangard, S., Sigl, G.: DATA \u2013 differential address trace analysis: finding address-based side-channels in binaries. In: USENIX Security, pp. 603\u2013620 (2018)"},{"key":"12_CR76","doi-asserted-by":"crossref","unstructured":"Xu, F., Ma, X., Zhang, Q., Lo, H.K., Pan, J.W.: Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92(2), 025002-1\u2013025002-60 (2020)","DOI":"10.1103\/RevModPhys.92.025002"},{"key":"12_CR77","unstructured":"Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: USENIX Security, pp. 719\u2013732 (2014)"},{"issue":"040503","key":"12_CR78","first-page":"1","volume":"4","author":"Q Zhang","year":"2019","unstructured":"Zhang, Q., Xu, F., Li, L., Liu, N.L., Pan, J.W.: Quantum information research in China. Quantum Sci. Technol. 4(040503), 1\u20137 (2019)","journal-title":"Quantum Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88428-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:42:54Z","timestamp":1725853374000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88428-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030884277","9783030884284"],"references-count":78,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88428-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"2 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2021.athene-center.de\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"351","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.07","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.06","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}