{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:45:42Z","timestamp":1748583942190,"version":"3.40.3"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953119"},{"type":"electronic","value":"9783030953126"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95312-6_12","type":"book-chapter","created":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T17:08:51Z","timestamp":1643476131000},"page":"272-296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Side-Channeling the Kalyna Key Expansion"],"prefix":"10.1007","author":[{"given":"Chitchanok","family":"Chuengsatiansup","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Genkin","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Yarom","sequence":"additional","affiliation":[]},{"given":"Zhiyuan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,29]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O.: Yet another microarchitectural attack: exploiting I-cache. In: CSAW (2007)","DOI":"10.1145\/1314466.1314469"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K., Seifert, J.: Predicting secret keys via branch prediction. In: CT-RSA (2007)","DOI":"10.1007\/11967668_15"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Akshima, D.C., Ghosh, M., Goel, A., Sanadhya, S.K.: Single key recovery attacks on 9-round Kalyna-128\/256 and Kalyna-256\/512. In: ICISC (2015)","DOI":"10.1007\/978-3-319-30840-1_8"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Allan, T., Brumley, B.B., Falkner, K.E., van de Pol, J., Yarom, Y.: Amplifying side channels through performance degradation. In: ACSAC (2016)","DOI":"10.1145\/2991079.2991084"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"AlTawy, R., Abdelkhalek, A., Youssef, A.M.: A meet-in-the-middle attack on reduced-round Kalyna-b\/2b. IEICE Trans. Inf. Syst. 99-D(4), 1246\u20131250 (2016)","DOI":"10.1587\/transinf.2015EDL8174"},{"key":"12_CR6","unstructured":"Belarus Standard STB 34.101.31-2011: Information technology and security data encryption and integrity algorithms (2011). http:\/\/apmi.bsu.by\/assets\/files\/std\/belt-spec27.pdf"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C., Yarom, Y.: Sliding right into disaster: left-to-right sliding windows leak. In: CHES (2017)","DOI":"10.1007\/978-3-319-66787-4_27"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/11894063_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"J Bonneau","year":"2006","unstructured":"Bonneau, J., Mironov, I.: Cache-collision timing attacks against AES. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 201\u2013215. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_16"},{"key":"12_CR9","unstructured":"Brasser, F., M\u00fcller, U., Dmitrienko, A., Kostiainen, K., Capkun, S., Sadeghi, A.: Software grand exposure: SGX cache attacks are practical. In: WOOT (2017)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Van Bulck, J., Piessens, F., Strackx, R.: Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic. In: CCS (2018)","DOI":"10.1145\/3243734.3243822"},{"key":"12_CR11","unstructured":"Cabrera Aldaya, A., Brumley, B.B.: HyperDegrade: from GHz to MHz effective CPU frequencies. arXiv:2101.01077 (2021)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Cabrera Aldaya, A., Brumley, B.B., ul Hassan, S., Pereida Garc\u00eda, C., Tuveri, N.: Port contention for fun and profit. In: IEEE SP (2019)","DOI":"10.1109\/SP.2019.00066"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Cabrera Aldaya, A., Garc\u00eda, C.P., Tapia, L.M.A., Brumley, B.B.: Cache-timing attacks on RSA key generation. TCHES 2019(4), 213\u2013242 (2019)","DOI":"10.46586\/tches.v2019.i4.213-242"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Chakraborty, A., Bhattacharya, S., Alam, M., Patranabis, S., Mukhopadhyay, D.: RASSLE: return address stack based side-channel leakage. TCHES 2021(2), 275\u2013303 (2021)","DOI":"10.46586\/tches.v2021.i2.275-303"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Chuengsatiansup, C., Feutrill, A., Sim, R.Q., Yarom, Y.: RSA key recovery from digit equivalence information. In: ACNS (2022)","DOI":"10.1007\/978-3-031-09234-3_10"},{"key":"12_CR16","unstructured":"Compton, K.J., Timm, B., VanLaven, J.: A simple power analysis attack on the Serpent key schedule. ePrint Archive 2009\/473 (2009)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Dall, F., De Micheli, G., Eisenbarth, T., Genkin, D., Heninger, N., Moghimi, A., Yarom, Y.: CacheQuote: efficiently recovering long-term secrets of SGX EPID via cache attacks. TCHES 2018(2), 171\u2013191 (2018)","DOI":"10.46586\/tches.v2018.i2.171-191"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Dassance, F., Venelli, A.: Combined fault and side-channel attacks on the AES key schedule. In: FDTC (2012)","DOI":"10.1109\/FDTC.2012.10"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Duman, O., Youssef, A.M.: Fault analysis on Kalyna. Inf. Secur. J. A Glob. Perspect. 26(5), 249\u2013265 (2017)","DOI":"10.1080\/19393555.2017.1371361"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Fernandes Medeiros, S., G\u00e9rard, F., Veshchikov, N., Lerman, L., Markowitch, O.: Breaking Kalyna 128\/128 with power attacks. In: SPACE (2016)","DOI":"10.1007\/978-3-319-49445-6_23"},{"issue":"1","key":"12_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13389-016-0141-6","volume":"8","author":"Q Ge","year":"2016","unstructured":"Ge, Q., Yarom, Y., Cock, D., Heiser, G.: A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptogr. Eng. 8(1), 1\u201327 (2016). https:\/\/doi.org\/10.1007\/s13389-016-0141-6","journal-title":"J. Cryptogr. Eng."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Genkin, D., Pachmanov, L., Tromer, E., Yarom, Y.: Drive-by key-extraction cache attacks from portable code. In: ACNS (2018)","DOI":"10.1007\/978-3-319-93387-0_5"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Genkin, D., Poussier, R., Sim, R.Q., Yarom, Y., Zhao, Y.: Cache vs. key-dependency: side channeling an implementation of Pilsung. TCHES 2020(1), 231\u2013255 (2020)","DOI":"10.46586\/tches.v2020.i1.231-255"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Gras, B., Razavi, K., Bosman, E., Bos, H., Giuffrida, C.: ASLR on the line: practical cache attacks on the MMU. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23271"},{"key":"12_CR25","unstructured":"Gruss, D., Spreitzer, R., Mangard, S.: Cache template attacks: automating attacks on inclusive last-level caches. In: USENIX Security (2015)"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Gullasch, D., Bangerter, E., Krenn, S.: Cache games - bringing access-based cache attacks on AES to practice. In: IEEE SP (2011)","DOI":"10.1109\/SP.2011.22"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Hund, R., Willems, C., Holz, T.: Practical timing side channel attacks against kernel space ASLR. In: IEEE SP (2013)","DOI":"10.1109\/SP.2013.23"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., Eisenbarth, T., Sunar, B.: Systematic reverse engineering of cache slice selection in Intel processors. In: DSD (2015)","DOI":"10.1109\/DSD.2015.56"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Irazoqui Apecechea, G., Eisenbarth, T., Sunar, B.: S\\$A: a shared cache attack that works across cores and defies VM sandboxing - and its application to AES. In: IEEE SP (2015)","DOI":"10.1109\/SP.2015.42"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Irazoqui Apecechea, G., Inci, M.S., Eisenbarth, T., Sunar, B.: Wait a minute! A fast, cross-VM attack on AES. In: RAID (2014)","DOI":"10.1007\/978-3-319-11379-1_15"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Kayaalp, M., Abu-Ghazaleh, N.B., Ponomarev, D.V., Jaleel, A.: A high-resolution side-channel attack on last-level cache. In: DAC (2016)","DOI":"10.1145\/2897937.2897962"},{"key":"12_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"12_CR33","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-0-387-38162-6_6","volume-title":"Power Analysis Attacks","author":"PC Kocher","year":"2007","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Power Analysis Attacks, pp. 119\u2013165. Springer, Boston, MA (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6_6"},{"key":"12_CR34","unstructured":"Kryptos Logic: A brief look at North Korean cryptography, July 2018. https:\/\/www.kryptoslogic.com\/blog\/2018\/07\/a-brief-look-at-north-korean-cryptography\/"},{"key":"12_CR35","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-981-15-8061-1_11","volume-title":"Proceedings of the Sixth International Conference on Mathematics and Computing","author":"S Kumar Gupta","year":"2021","unstructured":"Kumar Gupta, S., Ghosh, M., Mohanty, S.K.: Cryptanalysis of Kalyna block cipher using impossible differential technique. In: Giri, D., Buyya, R., Ponnusamy, S., De, D., Adamatzky, A., Abawajy, J.H. (eds.) Proceedings of the Sixth International Conference on Mathematics and Computing. AISC, vol. 1262, pp. 125\u2013141. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-8061-1_11"},{"issue":"4","key":"12_CR36","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/s10623-017-0353-5","volume":"86","author":"L Lin","year":"2017","unstructured":"Lin, L., Wu, W.: Improved meet-in-the-middle attacks on reduced-round Kalyna-128\/256 and Kalyna-256\/512. Des. Codes Crypt. 86(4), 721\u2013741 (2017). https:\/\/doi.org\/10.1007\/s10623-017-0353-5","journal-title":"Des. Codes Crypt."},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: IEEE SP (2015)","DOI":"10.1109\/SP.2015.43"},{"key":"12_CR38","unstructured":"MacWilliams, F.J., Sloane, N.: The Theory of Error-Correcting Codes. North-Holland Publishing Company, Amsterdam (1977)"},{"key":"12_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/3-540-36552-4_24","volume-title":"Information Security and Cryptology \u2014 ICISC 2002","author":"S Mangard","year":"2003","unstructured":"Mangard, S.: A simple power-analysis (SPA) attack on implementations of the AES key expansion. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 343\u2013358. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36552-4_24"},{"key":"12_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6","volume-title":"Power Analysis Attacks","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks. Springer, Boston, MA (2007). https:\/\/doi.org\/10.1007\/978-0-387-38162-6"},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"Maurice, C., Le Scouarnec, N., Neumann, C., Heen, O., Francillon, A.: Reverse engineering Intel last-level cache complex addressing using performance counters. In: RAID (2015)","DOI":"10.1007\/978-3-319-26362-5_3"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Moghimi, A., Irazoqui, G., Eisenbarth, T.: CacheZoom: how SGX amplifies the power of cache attacks. In: CHES (2017)","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"12_CR43","unstructured":"Mukhopadhyay, D., Chowdhury, D.R.: Key mixing in block ciphers through addition modulo $$2^n$$. ePrint Archive 2005\/383 (2005)"},{"key":"12_CR44","unstructured":"Oliynykov, R.: Kalyna block cipher reference implementation. https:\/\/github.com\/Roman-Oliynykov\/Kalyna-reference (2015). Accessed 6 Dec 2021"},{"key":"12_CR45","unstructured":"Oliynykov, R., Gorbenko, I., Kazymyrov, O., Ruzhentsev, V., Kuznetsov, O., Gorbenko, Y., Dyrda, O., Dolgov, V., Pushkaryov, A., Mordvinov, R., Kaidalov, D.: A new encryption standard of Ukraine: The Kalyna block cipher. ePrint Archive 2015\/650 (2015)"},{"key":"12_CR46","unstructured":"Ortiz, J.J.G., Compton, K.J.: A simple power analysis attack on the twofish key schedule. CoRR abs\/1611.07109 (2016)"},{"key":"12_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"DA Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1\u201320. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11605805_1"},{"key":"12_CR48","unstructured":"Percival, C.: Cache missing for fun and profit. In: Proceedings of BSDCan (2005). https:\/\/www.daemonology.net\/papers\/htt.pdf"},{"key":"12_CR49","unstructured":"Pereida Garc\u00eda, C., Brumley, B.B.: Constant-time callees with variable-time callers. In: USENIX Security (2017)"},{"key":"12_CR50","doi-asserted-by":"crossref","unstructured":"Pereida Garc\u00eda, C., Brumley, B.B., Yarom, Y.: Make sure DSA signing exponentiations really are constant-time. In: CCS (2016)","DOI":"10.1145\/2976749.2978420"},{"key":"12_CR51","doi-asserted-by":"crossref","unstructured":"Pessl, P., Groot Bruinderink, L., Yarom, Y.: To BLISS-B or not to be: attacking strongSwan\u2019s implementation of post-quantum signatures. In: CCS (2017)","DOI":"10.1145\/3133956.3134023"},{"key":"12_CR52","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Ferguson, N., Wagner, D., Hall, C.: Twofish: a 128-bit block cipher. In: First AES Conference (1998)"},{"key":"12_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-48892-8_3","volume-title":"Selected Areas in Cryptography","author":"B Schneier","year":"1999","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: On the Twofish key schedule. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 27\u201342. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48892-8_3"},{"key":"12_CR54","unstructured":"Shishkin, V., Dygin, D., Lavrikov, I., Marshalko, G., Rudskoy, V., Trifonov, D.: Low-weight and hi-end: draft Russian encryption standard. In: Current Trends in Cryptology (CTCrypt) (2014)"},{"key":"12_CR55","doi-asserted-by":"crossref","unstructured":"Shusterman, A., Kang, L., Haskal, Y., Meltser, Y., Mittal, P., Oren, Y., Yarom, Y.: Robust website fingerprinting through the cache occupancy channel. In: USENIX Security (2019)","DOI":"10.1109\/TDSC.2020.2988369"},{"key":"12_CR56","doi-asserted-by":"crossref","unstructured":"Van Bulck, J., Piessens, F., Strackx, R.: SGX-step: a practical attack framework for precise enclave execution control. In: SysTex (2017)","DOI":"10.1145\/3152701.3152706"},{"key":"12_CR57","unstructured":"Wagner, M., Heyse, S.: Single-trace template attack on the DES round keys of a recent smart card. ePrint Archive 2017\/57 (2017)"},{"key":"12_CR58","unstructured":"Wagner, M., Heyse, S.: Improved brute-force search strategies for single-trace and few-traces template attacks on the DES round keys. ePrint Archive 2018\/937 (2018)"},{"issue":"9","key":"12_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-016-0417-7","volume":"60","author":"G Wang","year":"2016","unstructured":"Wang, G., Zhu, C.: Single key recovery attacks on reduced AES-192 and Kalyna-128\/256. Sci. China Inf. Sci. 60(9), 1\u20133 (2016). https:\/\/doi.org\/10.1007\/s11432-016-0417-7","journal-title":"Sci. China Inf. Sci."},{"key":"12_CR60","doi-asserted-by":"crossref","unstructured":"Wichelmann, J., Moghimi, A., Eisenbarth, T., Sunar, B.: MicroWalk: a framework for finding side channels in binaries. In: ACSAC (2018)","DOI":"10.1145\/3274694.3274741"},{"key":"12_CR61","doi-asserted-by":"crossref","unstructured":"Xu, Y., Cui, W., Peinado, M.: Controlled-channel attacks: deterministic side channels for untrusted operating systems. In: IEEE SP (2015)","DOI":"10.1109\/SP.2015.45"},{"key":"12_CR62","unstructured":"Yan, M., Fletcher, C.W., Torrellas, J.: Cache telepathy: leveraging shared resource attacks to learn DNN architectures. In: USENIX Security (2020)"},{"key":"12_CR63","unstructured":"Yarom, Y.: Mastik: a micro-architectural side-channel toolkit (2016). https:\/\/cs.adelaide.edu.au\/~yval\/Mastik"},{"key":"12_CR64","unstructured":"Yarom, Y., Falkner, K.: Flush+Reload: a high resolution, low noise, L3 cache side-channel attack. In: USENIX Security (2014)"},{"key":"12_CR65","unstructured":"Yarom, Y., Ge, Q., Liu, F., Lee, R.B., Heiser, G.: Mapping the Intel last-level cache. ePrint Archive 2015\/905 (2015)"},{"issue":"2","key":"12_CR66","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s13389-017-0152-y","volume":"7","author":"Y Yarom","year":"2017","unstructured":"Yarom, Y., Genkin, D., Heninger, N.: CacheBleed: a timing attack on OpenSSL constant-time RSA. J. Cryptogr. Eng. 7(2), 99\u2013112 (2017). https:\/\/doi.org\/10.1007\/s13389-017-0152-y","journal-title":"J. Cryptogr. Eng."},{"key":"12_CR67","doi-asserted-by":"crossref","unstructured":"Yuce, B., Schaumont, P., Witteman, M.: Fault attacks on secure embedded software: threats, design, and evaluation. J. Hardw. Syst. Secur. 2(2), 111\u2013130 (2018)","DOI":"10.1007\/s41635-018-0038-1"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95312-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T16:03:30Z","timestamp":1726589010000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95312-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953119","9783030953126"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95312-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"29 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CT-RSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cryptographers\u2019 Track at the RSA Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Francisco, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 February 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ctrsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ct-rsa-2022.auckland.ac.nz\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}