{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:34:24Z","timestamp":1774539264940,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134028","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1857-1874","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":91,"title":["Side-Channel Attacks on BLISS Lattice-Based Signatures"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Espitau","sequence":"first","affiliation":[{"name":"UPMC, Paris, France"}]},{"given":"Pierre-Alain","family":"Fouque","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Rennes I, Rennes, France"}]},{"given":"Beno\u00eet","family":"G\u00e9rard","sequence":"additional","affiliation":[{"name":"DGA.MI, Bruz, France"}]},{"given":"Mehdi","family":"Tibouchi","sequence":"additional","affiliation":[{"name":"NTT Corporation, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Steven D. Galbraith (Ed.)","author":"Aciiccmez Onur","unstructured":"Onur Aciiccmez, Shay Gueron, and Jean-Pierre Seifert. 2007. New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures IMACC (LNCS), Steven D. Galbraith (Ed.), Vol. Vol. 4887. Springer, 185--203."},{"key":"e_1_3_2_2_2_1","volume-title":"cCetin Kaya Kocc, and Jean-Pierre Seifert","author":"Aciiccmez Onur","year":"2007","unstructured":"Onur Aciiccmez, cCetin Kaya Kocc, and Jean-Pierre Seifert 2007. On the Power of Simple Branch Prediction Analysis. ASIACCS, Feng Bao and Steven Miller (Eds.). ACM, 312--320."},{"key":"e_1_3_2_2_3_1","volume-title":"cCetin Kaya Kocc, and Jean-Pierre Seifert","author":"Aciiccmez Onur","year":"2007","unstructured":"Onur Aciiccmez, cCetin Kaya Kocc, and Jean-Pierre Seifert 2007. Predicting Secret Keys Via Branch Prediction. In CT-RSA (LNCS), Masayuki Abe (Ed.), Vol. Vol. 4377. Springer, 225--242."},{"key":"e_1_3_2_2_4_1","volume-title":"David Pointcheval","author":"Akleylek Sedat","unstructured":"Sedat Akleylek, Nina Bindel, Johannes A. Buchmann, Juliane Kr\u00e4mer, and Giorgia Azzurra Marson. 2016. An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation AFRICACRYPT (LNCS), David Pointcheval, Abderrahmane Nitaj, and Tajjeeddine Rachidi (Eds.), Vol. Vol. 9646. Springer, 44--60."},{"key":"e_1_3_2_2_5_1","unstructured":"Ian Beer 2016. Linux: textttperf_event_open() can race with execve(). Google Project Zero bug report. (2016). https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=807."},{"key":"e_1_3_2_2_6_1","volume-title":"Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks FDTC","author":"Bindel Nina","unstructured":"Nina Bindel, Johannes A. Buchmann, and Juliane Kr\u00e4mer. 2016. Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks FDTC, Philippe Maurine and Michael Tunstall (Eds.). IEEE Computer Society, 63--77."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2009.08.012"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:02Z","timestamp":1750212662000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134028"}},"subtitle":["Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":7,"alternative-id":["10.1145\/3133956.3134028","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134028","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}