{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:28:54Z","timestamp":1752283734482,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T00:00:00Z","timestamp":1463356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union Horizon 2020","award":["644729"],"award-info":[{"award-number":["644729"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,16]]},"DOI":"10.1145\/2903150.2907756","type":"proceedings-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T19:23:42Z","timestamp":1464895422000},"page":"315-322","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure architectures of future emerging cryptography\n            <i>SAFEcrypto<\/i>"],"prefix":"10.1145","author":[{"given":"Maire","family":"O'Neill","sequence":"first","affiliation":[{"name":"The Queen's University Belfast, United Kingdom"}]},{"given":"Elizabeth","family":"O'Sullivan","sequence":"additional","affiliation":[{"name":"The Queen's University Belfast, United Kingdom"}]},{"given":"Gavin","family":"McWilliams","sequence":"additional","affiliation":[{"name":"The Queen's University Belfast, United Kingdom"}]},{"given":"Markku-Juhani","family":"Saarinen","sequence":"additional","affiliation":[{"name":"The Queen's University Belfast, United Kingdom"}]},{"given":"Ciara","family":"Moore","sequence":"additional","affiliation":[{"name":"The Queen's University Belfast, United Kingdom"}]},{"given":"Ayesha","family":"Khalid","sequence":"additional","affiliation":[{"name":"The Queen's University Belfast, United Kingdom"}]},{"given":"James","family":"Howe","sequence":"additional","affiliation":[{"name":"The Queen's University Belfast, United Kingdom"}]},{"given":"Rafael","family":"del Pino","sequence":"additional","affiliation":[{"name":"INRIA, France"}]},{"given":"Michel","family":"Abdalla","sequence":"additional","affiliation":[{"name":"INRIA, France"}]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[{"name":"ALaRI - Universit\u00e8 Della Svizzera Italiana, Switzerland"}]},{"given":"Felipe","family":"Valencia","sequence":"additional","affiliation":[{"name":"ALaRI - Universit\u00e8 Della Svizzera Italiana, Switzerland"}]},{"given":"Tim","family":"G\u00fcneysu","sequence":"additional","affiliation":[{"name":"University of Bremen"}]},{"given":"Tobias","family":"Oder","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Germany"}]},{"given":"Adrian","family":"Waller","sequence":"additional","affiliation":[{"name":"Thales Research UK, United Kingdom"}]},{"given":"Glyn","family":"Jones","sequence":"additional","affiliation":[{"name":"Thales Research UK, United Kingdom"}]},{"given":"Anthony","family":"Barnett","sequence":"additional","affiliation":[{"name":"Thales Research UK, United Kingdom"}]},{"given":"Robert","family":"Griffin","sequence":"additional","affiliation":[{"name":"RSA\/EMC2, Ireland"}]},{"given":"Andrew","family":"Byrne","sequence":"additional","affiliation":[{"name":"RSA\/EMC2, Ireland"}]},{"given":"Bassem","family":"Ammar","sequence":"additional","affiliation":[{"name":"HW Communications, United Kingdom"}]},{"given":"David","family":"Lund","sequence":"additional","affiliation":[{"name":"HW Communications, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_2_1_2_1","volume-title":"NISTIR 8105","author":"Chen L.","year":"2016","unstructured":"L. Chen , S. Jordan , Y. K. Liu , D. Moody , R. Peralta , R. Perlner , D. Smith-Tone , Report on Post-Quantum Cryptography , NISTIR 8105 , National Institute of Standards and Technology (NIST) , Feb. 2016 . L. Chen, S. Jordan, Y. K. Liu, D. Moody, R. Peralta, R. Perlner, D. Smith-Tone, Report on Post-Quantum Cryptography, NISTIR 8105, National Institute of Standards and Technology (NIST), Feb. 2016."},{"key":"e_1_3_2_1_3_1","first-page":"114","volume":"44","author":"Public-Key Cryptosystem R. J., A","year":"1978","unstructured":"McEliece, R. J., A Public-Key Cryptosystem Based On Algebraic Coding Theory , DSN Progress Report, 42-- 44 : 114 , 1978 . McEliece, R. J., A Public-Key Cryptosystem Based On Algebraic Coding Theory, DSN Progress Report, 42--44: 114, 1978.","journal-title":"DSN Progress Report, 42--"},{"key":"e_1_3_2_1_4_1","volume-title":"Problems of Control and Information Theory, Problemy Upravlenija i Teorii Informacii 15: 159--166","author":"H.","year":"1986","unstructured":"Niederreiter, H. , Knapsack-type cryptosystems and algebraic coding theory , Problems of Control and Information Theory, Problemy Upravlenija i Teorii Informacii 15: 159--166 , 1986 . Niederreiter, H., Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory, Problemy Upravlenija i Teorii Informacii 15: 159--166, 1986."},{"key":"e_1_3_2_1_5_1","unstructured":"Merkle R. Secrecy authentication and public key systems \/ A certified digital signature Ph.D. dissertation Dept. of Electrical Engineering Stanford University 1979\n  .   Merkle R. Secrecy authentication and public key systems \/ A certified digital signature Ph.D. dissertation Dept. of Electrical Engineering Stanford University 1979."},{"key":"e_1_3_2_1_6_1","volume-title":"Dagstuhl Workshop on Cryptography","author":"Oil The","year":"1997","unstructured":"Patarin, J., The Oil and Vinegar Signature Scheme , Dagstuhl Workshop on Cryptography , 1997 . Patarin, J., The Oil and Vinegar Signature Scheme, Dagstuhl Workshop on Cryptography, 1997."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/648184.749737"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9031-0"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_27"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_31"},{"key":"e_1_3_2_1_12_1","volume-title":"CCSDS 350.6-G-1","author":"Key Management Concept Space Missions","year":"2011","unstructured":"Space Missions Key Management Concept , Informational Report , CCSDS 350.6-G-1 , Nov. 2011 . Space Missions Key Management Concept, Informational Report, CCSDS 350.6-G-1, Nov. 2011."},{"key":"e_1_3_2_1_13_1","unstructured":"Security Architecture for Space Data Systems Recommended Practice CCSDS 351.0-M-1 Nov. 2012.  Security Architecture for Space Data Systems Recommended Practice CCSDS 351.0-M-1 Nov. 2012."},{"key":"e_1_3_2_1_14_1","volume-title":"CCSDS 355.0-R-3","author":"Link Security Protocol Space Data","year":"2013","unstructured":"Space Data Link Security Protocol , Draft Recomended Standard , CCSDS 355.0-R-3 , Oct. 2013 . Space Data Link Security Protocol, Draft Recomended Standard, CCSDS 355.0-R-3, Oct. 2013."},{"key":"e_1_3_2_1_15_1","volume-title":"CCSDS 350.9-G-1","author":"Algorithms Cryptographic","year":"2014","unstructured":"Cryptographic Algorithms , Informational Report , CCSDS 350.9-G-1 , Dec. 2014 . Cryptographic Algorithms, Informational Report, CCSDS 350.9-G-1, Dec. 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"NIST Special Publication","author":"National Institute of Standards and Technology (NIST)","year":"2012","unstructured":"National Institute of Standards and Technology (NIST) , Recommendation for Key Management - Part 1: General (Revision 3) , NIST Special Publication 800-57, July 2012 . National Institute of Standards and Technology (NIST), Recommendation for Key Management - Part 1: General (Revision 3), NIST Special Publication 800-57, July 2012."},{"volume-title":"TechAmerica's 24th Annual Federal CIO\/CISO Survey Identifies Top 3 Priorities for Government IT Officials","year":"2014","key":"e_1_3_2_1_17_1","unstructured":"CompTIA , TechAmerica's 24th Annual Federal CIO\/CISO Survey Identifies Top 3 Priorities for Government IT Officials , 2014 . CompTIA, TechAmerica's 24th Annual Federal CIO\/CISO Survey Identifies Top 3 Priorities for Government IT Officials, 2014."},{"key":"e_1_3_2_1_18_1","unstructured":"European Commission Digital Agenda for Europe at http:\/\/ec.europa.eu\/digital-agenda\/en\/open-data-portals  European Commission Digital Agenda for Europe at http:\/\/ec.europa.eu\/digital-agenda\/en\/open-data-portals"},{"key":"e_1_3_2_1_19_1","volume-title":"On the Ineffectiveness of Todays Privacy Regulations for Secure Smart City Networks","author":"A.","year":"2013","unstructured":"Bartoli, A. et al ., On the Ineffectiveness of Todays Privacy Regulations for Secure Smart City Networks , 2013 . at http:\/\/www.ict-exalted.eu\/publications\/deliverables.html Bartoli, A. et al., On the Ineffectiveness of Todays Privacy Regulations for Secure Smart City Networks, 2013. at http:\/\/www.ict-exalted.eu\/publications\/deliverables.html"},{"key":"e_1_3_2_1_20_1","volume-title":"Critical Communications World","author":"Berteny B.","year":"2013","unstructured":"B. Berteny , LTE Standards for Public Safety-3GPP view , Critical Communications World , May 2013 . B. Berteny, LTE Standards for Public Safety-3GPP view, Critical Communications World, May 2013."},{"key":"e_1_3_2_1_21_1","volume-title":"March","author":"IETF","year":"2015","unstructured":"IETF RTCWEB , WebRTC Security Architecture , March 2015 . IETF RTCWEB, WebRTC Security Architecture, March 2015."},{"key":"e_1_3_2_1_22_1","unstructured":"Security of Multimedia Broadcast\/Multicast Service (MBMS) ETSI at http:\/\/www.etsi.org\/deliver\/etsi-ts\/133200-133299\/133246\/10.01.00-60\/ts-133246v100100p.pdf.  Security of Multimedia Broadcast\/Multicast Service (MBMS) ETSI at http:\/\/www.etsi.org\/deliver\/etsi-ts\/133200-133299\/133246\/10.01.00-60\/ts-133246v100100p.pdf."},{"key":"e_1_3_2_1_23_1","volume-title":"IETF RFC","author":"T. Hardjono","year":"2004","unstructured":"T. Hardjono et al. , The Multicast Group Security Architecture , IETF RFC 3740, March 2004 . T. Hardjono et al., The Multicast Group Security Architecture, IETF RFC 3740, March 2004."},{"key":"e_1_3_2_1_24_1","unstructured":"Satellite Earth Stations and Systems (SES); Broadband Satellite Multimedia (BSM) ETSI at http:\/\/www.etsi.org\/deliver\/etsi-ts\/102400-102499\/102466\/01.01.01-60\/ts-102466v010101p.pdf  Satellite Earth Stations and Systems (SES); Broadband Satellite Multimedia (BSM) ETSI at http:\/\/www.etsi.org\/deliver\/etsi-ts\/102400-102499\/102466\/01.01.01-60\/ts-102466v010101p.pdf"},{"key":"e_1_3_2_1_25_1","unstructured":"www.safecrypto.eu\/  www.safecrypto.eu\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258604"},{"key":"e_1_3_2_1_27_1","first-page":"112","volume-title":"Crypto '97","author":"Goldreich O.","year":"1997","unstructured":"O. Goldreich , S. Goldwasser and S. Halevi , Public Key Encryption from Lattice Reduction Problems , Crypto '97 , pp 112 -- 131 , 1997 . O. Goldreich, S. Goldwasser and S. Halevi, Public Key Encryption from Lattice Reduction Problems, Crypto '97, pp 112--131, 1997."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703978"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898037"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_20"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04852-9_2"},{"key":"e_1_3_2_1_35_1","volume-title":"CRYPTO 2010","author":"Peikert C.","year":"2010","unstructured":"C. Peikert , An Efficient and Parallel Gaussian Sampler for Lattices , CRYPTO 2010 , 2010 . C. Peikert, An Efficient and Parallel Gaussian Sampler for Lattices, CRYPTO 2010, 2010."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-014-0218-3"},{"key":"e_1_3_2_1_37_1","volume-title":"SAC 2013","author":"Buchmann J.","year":"2013","unstructured":"J. Buchmann , D. Cabarcas , F. G\u00f6pfert , A. H\u00fclsing , and P. Weiden , Discrete Ziggurat: A time-memory trade-off for sampling from a Gaussian distribution over the integers , SAC 2013 , 402--417, 2013 . J. Buchmann, D. Cabarcas, F. G\u00f6pfert, A. H\u00fclsing, and P. Weiden, Discrete Ziggurat: A time-memory trade-off for sampling from a Gaussian distribution over the integers, SAC 2013, 402--417, 2013."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488677"},{"key":"e_1_3_2_1_40_1","unstructured":"https:\/\/www.openswan.org\/  https:\/\/www.openswan.org\/"},{"key":"e_1_3_2_1_41_1","unstructured":"https:\/\/github.com\/mjosaarinen\/hilabliss  https:\/\/github.com\/mjosaarinen\/hilabliss"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_19"},{"key":"e_1_3_2_1_48_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology, CRYPTO","author":"Kocher P. C.","year":"1999","unstructured":"P. C. Kocher , J. Jaffe and B. Jun . Differential Power Analysis . In M. J. Weiner, editor, Advances in Cryptology, CRYPTO 1999 , vol. 1666 of LNCS , pp 388 -- 397 . P. C. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. In M. J. Weiner, editor, Advances in Cryptology, CRYPTO 1999, vol. 1666 of LNCS, pp 388--397."},{"key":"e_1_3_2_1_49_1","volume-title":"On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme","author":"Eisenbarth T.","year":"2008","unstructured":"T. Eisenbarth , T. Kasper , A. Moradi , C. Paar und M. Salmasizadeh , On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008 . T. Eisenbarth, T. Kasper, A. Moradi, C. Paar und M. Salmasizadeh, On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme, 2008."},{"key":"e_1_3_2_1_50_1","volume-title":"Cache-timing attacks on AES","author":"Bernstein Daniel J.","year":"2005","unstructured":"Daniel J. Bernstein , Cache-timing attacks on AES , 2005 , http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf. Daniel J. Bernstein, Cache-timing attacks on AES, 2005, http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_52_1","volume-title":"Topics in Cryptology-CT-RSA","author":"Ac\u00e4\u015bicmez O.","year":"2007","unstructured":"O. Ac\u00e4\u015bicmez , J. P. Seifert , and C. K. Koc , Predicting Secret Keys via Branch Prediction , Topics in Cryptology-CT-RSA ( 2007 ). O. Ac\u00e4\u015bicmez, J. P. Seifert, and C. K. Koc, Predicting Secret Keys via Branch Prediction, Topics in Cryptology-CT-RSA (2007)."},{"key":"e_1_3_2_1_53_1","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smartcards","author":"Mangard S.","year":"2007","unstructured":"S. Mangard , E. Oswald und T. Popp , Power Analysis Attacks: Revealing the Secrets of Smartcards , Springer-Verlag , 2007 . S. Mangard, E. Oswald und T. Popp, Power Analysis Attacks: Revealing the Secrets of Smartcards, Springer-Verlag, 2007."},{"key":"e_1_3_2_1_54_1","first-page":"13","volume-title":"CHES 2002","author":"Chari Suresh","year":"2002","unstructured":"Suresh Chari , Josyula R. Rao , and Pankaj Rohatgi , Template attacks , CHES 2002 , 2002 , pp. 13 -- 28 . Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi, Template attacks, CHES 2002, 2002, pp. 13--28."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_3"},{"key":"e_1_3_2_1_57_1","volume-title":"IPA: A new class of power attacks, Cryptographic Hardware and Embedded Systems","author":"Fahn P. N.","year":"1999","unstructured":"P. N. Fahn , P. K. Pearson , IPA: A new class of power attacks, Cryptographic Hardware and Embedded Systems , Springer Berlin Heidelberg , 1999 . P. N. Fahn, P. K. Pearson, IPA: A new class of power attacks, Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, 1999."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"volume-title":"Proceedings of the conference on Design, automation and test in Europe-Volume 1","author":"Tiri K.","key":"e_1_3_2_1_60_1","unstructured":"K. Tiri and I. Verbauwhede , A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , In Proceedings of the conference on Design, automation and test in Europe-Volume 1 p. 10246). IEEE Computer Society, 2004. K. Tiri and I. Verbauwhede, A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation, In Proceedings of the conference on Design, automation and test in Europe-Volume 1 p. 10246). IEEE Computer Society, 2004."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology (CRYPTO","author":"Chari S.","year":"1999","unstructured":"S. Chari , C. Jutla , J. Rao , and P. Rohatgi , Towards sound approaches to counteract power-analysis attacks , In Advances in Cryptology (CRYPTO 1999 ). Lecture Notes in Computer Science, Vol. 1666 , pp. 398 -- 412 . Springer , 1999. S. Chari, C. Jutla, J. Rao, and P. Rohatgi, Towards sound approaches to counteract power-analysis attacks, In Advances in Cryptology (CRYPTO 1999). Lecture Notes in Computer Science, Vol. 1666, pp. 398--412. Springer, 1999."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190590"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_34"}],"event":{"name":"CF'16: Computing Frontiers Conference","sponsor":["Micron Foundation Micron Technology Foundation, Inc.","ACM Association for Computing Machinery","Politecnico di Milano Politecnico di Milano","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IBM IBM"],"location":"Como Italy","acronym":"CF'16"},"container-title":["Proceedings of the ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2903150.2907756","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2903150.2907756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:16Z","timestamp":1750222576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2903150.2907756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,16]]},"references-count":57,"alternative-id":["10.1145\/2903150.2907756","10.1145\/2903150"],"URL":"https:\/\/doi.org\/10.1145\/2903150.2907756","relation":{},"subject":[],"published":{"date-parts":[[2016,5,16]]},"assertion":[{"value":"2016-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}