{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:46Z","timestamp":1772283706441,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australian Department of Education and Training"},{"name":"Austrian Research Promotion Agency","award":["862235"],"award-info":[{"award-number":["862235"]}]},{"name":"Commission of the European Communities","award":["645622"],"award-info":[{"award-number":["645622"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134023","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1843-1855","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["To BLISS-B or not to be"],"prefix":"10.1145","author":[{"given":"Peter","family":"Pessl","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Leon Groot","family":"Bruinderink","sequence":"additional","affiliation":[{"name":"Technische Universiteit Eindhoven, Eindhoven, Netherlands"}]},{"given":"Yuval","family":"Yarom","sequence":"additional","affiliation":[{"name":"University of Adelaide and Data61, Adelaide, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation AFRICACRYPT","author":"Akleylek Sedat","year":"2016","unstructured":"Sedat Akleylek, Nina Bindel, Johannes A. Buchmann, Juliane Kr\u00e4mer, and Giorgia Azzurra Marson. 2016. An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation AFRICACRYPT 2016. 44--60."},{"key":"e_1_3_2_2_2_1","volume-title":"Post-quantum Key Exchange - A New Hope. In 25th USENIX Security Symposium. 327--343","author":"Alkim Erdem","year":"2016","unstructured":"Erdem Alkim, L\u00e9o Ducas, Thomas P\u00f6ppelmann, and Peter Schwabe 2016. Post-quantum Key Exchange - A New Hope. In 25th USENIX Security Symposium. 327--343."},{"key":"e_1_3_2_2_3_1","volume-title":"Katrina E. Falkner, Joop van de Pol, and Yuval Yarom","author":"Allan Thomas","year":"2016","unstructured":"Thomas Allan, Billy Bob Brumley, Katrina E. Falkner, Joop van de Pol, and Yuval Yarom 2016. Amplifying side channels through performance degradation ACSAC 2016. 422--435."},{"key":"e_1_3_2_2_4_1","first-page":"395","volume":"2015","author":"Bela\u00efd Sonia","year":"2015","unstructured":"Sonia Bela\u00efd, Jean-S\u00e9bastien Coron, Pierre-Alain Fouque, Beno\u00eet G\u00e9rard, Jean-Gabriel Kammerer, and Emmanuel Prouff 2015. Improved Side-Channel Analysis of Finite-Field Multiplication CHES 2015. 395--415.","journal-title":"Improved Side-Channel Analysis of Finite-Field Multiplication CHES"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_17"},{"key":"e_1_3_2_2_6_1","volume-title":"Smart, and Yuval Yarom","author":"Benger Naomi","year":"2014","unstructured":"Naomi Benger, Joop van de Pol, Nigel P. Smart, and Yuval Yarom. 2014. \"Ooh Aah\u0142dots, Just a Little Bit\": A Small Amount of Side Channel can Go a Long Way CHES 2014. 75--92."},{"key":"e_1_3_2_2_7_1","unstructured":"Daniel J. Bernstein. 2005. Cache-timing attacks on AES. (2005). Preprint available at http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88403-3_3"},{"key":"e_1_3_2_2_9_1","volume-title":"Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks FDTC","author":"Bindel Nina","year":"2016","unstructured":"Nina Bindel, Johannes A. Buchmann, and Juliane Kr\u00e4mer. 2016. Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks FDTC 2016. 63--77."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/792538.792543"},{"key":"e_1_3_2_2_11_1","volume-title":"Experimenting with Post-Quantum Cryptography. (July","author":"Braithwaite Matt","year":"2016","unstructured":"Matt Braithwaite. 2016. Experimenting with Post-Quantum Cryptography. (July 2016). https:\/\/security.googleblog.com\/2016\/07\/experimenting-with-post-quantum.html."},{"key":"e_1_3_2_2_12_1","volume-title":"ASIACRYPT","author":"Chen Yuanmi","year":"2011","unstructured":"Yuanmi Chen and Phong Q. Nguyen 2011. BKZ 2.0: Better Lattice Security Estimates. In ASIACRYPT 2011. 1--20."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"e_1_3_2_2_17_1","volume-title":"How to Prove Yourself: Practical Solutions to Identification and Signature Problems CRYPTO","author":"Fiat Amos","year":"1986","unstructured":"Amos Fiat and Adi Shamir 1986. How to Prove Yourself: Practical Solutions to Identification and Signature Problems CRYPTO 1986. 186--194."},{"key":"e_1_3_2_2_18_1","volume-title":"A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. Journal of Cryptographic Engineering","author":"Ge Qian","year":"2016","unstructured":"Qian Ge, Yuval Yarom, David Cock, and Gernot Heiser. 2016. A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. Journal of Cryptographic Engineering (2016)."},{"key":"e_1_3_2_2_19_1","first-page":"323","volume":"2016","author":"Bruinderink Leon Groot","year":"2016","unstructured":"Leon Groot Bruinderink, Andreas H\u00fclsing, Tanja Lange, and Yuval Yarom 2016. Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme CHES 2016. 323--345. Full version available at: http:\/\/ia.cr\/2016\/300.","journal-title":"Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme CHES"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_1"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_15"},{"key":"e_1_3_2_2_22_1","volume-title":"CECPQ1 results. (November","author":"Langley Adam","year":"2016","unstructured":"Adam Langley. 2016. CECPQ1 results. (November 2016). https:\/\/www.imperialviolet.org\/2016\/11\/28\/cecpq1.html."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_24"},{"key":"e_1_3_2_2_25_1","first-page":"319","volume":"2011","author":"Lindner Richard","year":"2011","unstructured":"Richard Lindner and Chris Peikert 2011. Better Key Sizes (and Attacks) for LWE-Based Encryption CT-RSA 2011. 319--339.","journal-title":"Better Key Sizes (and Attacks) for LWE-Based Encryption CT-RSA"},{"key":"e_1_3_2_2_26_1","volume-title":"Building a superconducting quantum computer - Invited Talk in PQCrypto","author":"Mariantoni Matteo","year":"2014","unstructured":"Matteo Mariantoni. 2014. Building a superconducting quantum computer - Invited Talk in PQCrypto 2014. (October 2014). https:\/\/www.youtube.com\/watch?v=wWHAs--HA1c."},{"key":"e_1_3_2_2_27_1","volume-title":"CacheZoom: How SGX Amplifies The Power of Cache Attacks. CoRR","author":"Moghimi Ahmad","year":"2017","unstructured":"Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. 2017. CacheZoom: How SGX Amplifies The Power of Cache Attacks. CoRR Vol. abs\/1703.06986 (2017)."},{"key":"e_1_3_2_2_28_1","volume-title":"Post-Quantum crypto standardization. (December","author":"NIST","year":"2016","unstructured":"NIST 2016. Post-Quantum crypto standardization. (December 2016). http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/call-for-proposals-2016.html."},{"key":"e_1_3_2_2_29_1","first-page":"1","article-title":"Beyond ECDSA and RSA","volume":"2014","author":"Oder Tobias","year":"2014","unstructured":"Tobias Oder, Thomas P\u00f6ppelmann, and Tim G\u00fcneysu. 2014. Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices DAC 2014. 110:1--110:6.","journal-title":"Lattice-based Digital Signatures on Constrained Devices DAC"},{"key":"e_1_3_2_2_30_1","volume-title":"Use of Public Standards for the Secure Sharing of Information Among National Security Systems. CNSS Advisory Memorundum Information Assurance 02--15. (July","author":"Committee on National Security Systems. 2015.","year":"2015","unstructured":"Committee on National Security Systems. 2015. Use of Public Standards for the Secure Sharing of Information Among National Security Systems. CNSS Advisory Memorundum Information Assurance 02--15. (July 2015)."},{"key":"e_1_3_2_2_31_1","volume-title":"Keromytis","author":"Oren Yossef","year":"2015","unstructured":"Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, and Angelos D. Keromytis 2015. The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications 23rd CCS. 1406--1418."},{"key":"e_1_3_2_2_32_1","first-page":"1","article-title":"Cache Attacks and Countermeasures","volume":"2006","author":"Osvik Dag Arne","year":"2006","unstructured":"Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES CT-RSA 2006. 1--20.","journal-title":"The Case of AES CT-RSA"},{"key":"e_1_3_2_2_34_1","volume-title":"Billy Bob Brumley, and Yuval Yarom","author":"Garc\u00eda Cesar Pereida","year":"2016","unstructured":"Cesar Pereida Garc\u00eda, Billy Bob Brumley, and Yuval Yarom. 2016. \"Make Sure DSA Signing Exponentiations Really are Constant-Time\" CCS 2016. 1639--1650."},{"key":"e_1_3_2_2_35_1","volume-title":"Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures INDOCRYPT","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl. 2016. Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures INDOCRYPT 2016. 153--170."},{"key":"e_1_3_2_2_36_1","first-page":"255","volume":"2016","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl and Stefan Mangard 2016. Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability CT-RSA 2016. 255--270.","journal-title":"Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability CT-RSA"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27660-6_9"},{"key":"e_1_3_2_2_38_1","first-page":"3","article-title":"Just a Little Bit More","volume":"2015","author":"PolVan de Pol Joop","year":"2015","unstructured":"Joop VANPolvan de PolVan de Pol, Nigel P. Smart, and Yuval Yarom. 2015. Just a Little Bit More. In CT-RSA 2015. 3--21.","journal-title":"CT-RSA"},{"key":"e_1_3_2_2_39_1","first-page":"353","volume":"2014","author":"P\u00f6ppelmann Thomas","year":"2014","unstructured":"Thomas P\u00f6ppelmann, L\u00e9o Ducas, and Tim G\u00fcneysu 2014. Enhanced Lattice-Based Signatures on Reconfigurable Hardware CHES 2014. 353--370.","journal-title":"Enhanced Lattice-Based Signatures on Reconfigurable Hardware CHES"},{"key":"e_1_3_2_2_40_1","unstructured":"GNU Project. n.d.. GLPK (GNU Linear Programming Kit). ( n.d.). https:\/\/www.gnu.org\/software\/glpk\/."},{"key":"e_1_3_2_2_41_1","volume-title":"On lattices, learning with errors, random linear codes, and cryptography STOC","author":"Regev Oded","year":"2005","unstructured":"Oded Regev. 2005. On lattices, learning with errors, random linear codes, and cryptography STOC 2005. 84--93."},{"key":"e_1_3_2_2_42_1","volume-title":"Arithmetic coding and blinding countermeasures for lattice signatures. Journal of Cryptographic Engineering","author":"Saarinen Markku-Juhani O.","year":"2017","unstructured":"Markku-Juhani O. Saarinen. 2017. Arithmetic coding and blinding countermeasures for lattice signatures. Journal of Cryptographic Engineering (2017)."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134023","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:02Z","timestamp":1750212662000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134023"}},"subtitle":["Attacking strongSwan's Implementation of Post-Quantum Signatures"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":38,"alternative-id":["10.1145\/3133956.3134023","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134023","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}