{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T09:12:09Z","timestamp":1768986729911,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Australian Department of Education and Training through an Endeavour Research Fellowship"},{"name":"Tthe 2017-2018 Rothschild Postdoctoral Fellowship"},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8650-16-C-7622"],"award-info":[{"award-number":["FA8650-16-C-7622"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1408734"],"award-info":[{"award-number":["CNS-1408734"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB15H328"],"award-info":[{"award-number":["70NANB15H328"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The Warren Center for Network and Data Sciences"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134029","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"845-858","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["May the Fourth Be With You"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Genkin","sequence":"first","affiliation":[{"name":"University of Pennsylvania &amp; University of Maryland, Philadelphia and College Park, PA, USA"}]},{"given":"Luke","family":"Valenta","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Yuval","family":"Yarom","sequence":"additional","affiliation":[{"name":"University of Adelaide &amp; Data61, Adelaide, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"git-crypt -- Transpartent File Encryption in git. https:\/\/www.agwa.name\/projects\/git-crypt\/."},{"key":"e_1_3_2_1_2_1","unstructured":"GNU Privacy Guard. https:\/\/www.gnupg.org"},{"key":"e_1_3_2_1_3_1","unstructured":"GnuPG Frontends. https:\/\/www.gnupg.org\/related_software\/frontends.html"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_17"},{"key":"e_1_3_2_1_6_1","volume-title":"Katrina Falkner, Joop van de Pol, and Yuval Yarom.","author":"Allan Thomas","year":"2016","unstructured":"Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, and Yuval Yarom. 2016. Amplifying Side Channels Through Performance Degradation. In ACSAC. Los Angeles, CA, US."},{"key":"e_1_3_2_1_7_1","volume-title":"Should Curve25519 keys be vali-dated? (April","author":"Aumasson Jean-Philippe","year":"2017","unstructured":"Jean-Philippe Aumasson. 2017. Should Curve25519 keys be vali-dated? (April 2017). https:\/\/research.kudelskisecurity.com\/2017\/04\/25\/should-ecdh-keys-be-validated\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Elaine Barker Lily Chen Allen Roginsky and Miles Smid. 2013. NIST SP 800-56A: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revision 2). (2013).","DOI":"10.6028\/NIST.SP.800-56Ar2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_14"},{"key":"e_1_3_2_1_10_1","volume-title":"CHES","author":"Benger Naomi","year":"2014","unstructured":"Naomi Benger, Joop van de Pol, Nigel P. Smart, and Yuval Yarom. 2014. \"Ooh Aah... Just a Little Bit\": A Small Amount of Side Channel Can Go a Long Way. In CHES 2014. 75--92."},{"key":"e_1_3_2_1_11_1","unstructured":"Daniel J. Bernstein. Curve25519: new Diffie-Hellman speed records. https:\/\/cr.yp.to\/ecdh.html"},{"key":"e_1_3_2_1_12_1","unstructured":"Daniel J. Bernstein. A state-of-the-art Diffie-Hellman function. https:\/\/cr.yp.to\/ecdh.html."},{"key":"e_1_3_2_1_13_1","unstructured":"Daniel J. Bernstein. 2005. Cache-timing attacks on AES. (2005). http:\/\/cr.yp.to\/papers.html#cachetiming."},{"key":"e_1_3_2_1_14_1","volume-title":"PKC. New-York","author":"Bernstein Daniel J.","unstructured":"Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman Speed Records. In PKC. New-York, NY, US, 207--228."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_18"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Daniel J. Bernstein Tanja Lange and Peter Schwabe. 2012. The Security Impact of a New Cryptographic Library. In LatinCrypt'12. Santiago CL 159--176. 10.1007\/978-3-642-33481-8_9","DOI":"10.1007\/978-3-642-33481-8_9"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_8"},{"key":"e_1_3_2_1_18_1","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC)","author":"Billet Olivier","year":"2015","unstructured":"Olivier Billet and Marc Joye. 2003. The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC) 2015. Springer, 34--42."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_39"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_20"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"J. Callas L. Donnerhacke H. Finney D. Shaw and R. Thayer. 2007. OpenPGP Message Format. RFC 4880. (Nov. 2007).","DOI":"10.17487\/rfc4880"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(86)90023-0"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39927-8_32"},{"key":"e_1_3_2_1_25_1","unstructured":"Pidgin Community. Pidgin. https:\/\/www.pidgin.im\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_25"},{"key":"e_1_3_2_1_27_1","volume-title":"Why not validate Curve25519 public keys could be harmful. (Sept","author":"Duong Thai","year":"2015","unstructured":"Thai Duong. 2015. Why not validate Curve25519 public keys could be harmful. (Sept. 2015). https:\/\/vnhacker.blogspot.ch\/2015\/09\/why-not-validating-curve25519-public.html"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"M. Elkins D. Del Torto R. Levien and T. Roessler. 2001. MIME Security with OpenPGP. RFC 3156. (2001). http:\/\/www.ietf.org\/rfc\/rfc3156.txt","DOI":"10.17487\/rfc3156"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_10"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513110"},{"key":"e_1_3_2_1_31_1","volume-title":"Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. 265--282.","author":"Fan Junfeng","unstructured":"Junfeng Fan and Ingrid Verbauwhede. 2012. An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost. In Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. 265--282."},{"key":"e_1_3_2_1_32_1","volume-title":"A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. Journal of Cryptographic Engineering -","author":"Ge Qian","year":"2016","unstructured":"Qian Ge, Yuval Yarom, David Cock, and Gernot Heiser. 2016. A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. Journal of Cryptographic Engineering - (2016)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851486"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_13"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978353"},{"key":"e_1_3_2_1_37_1","volume-title":"Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. In CHES 2014","author":"Genkin Daniel","year":"2014","unstructured":"Daniel Genkin, Itamar Pipman, and Eran Tromer. 2014. Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. In CHES 2014. Springer, 242--260. Extended version: Cryptology ePrint Archive, Report 2014\/626."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_1_39_1","unstructured":"T. Glaser. OpenPGP plugin for Pidgin. https:\/\/packages.debian.org\/sid\/pidgin-openpgp"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_15"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Leon Groot Bruinderink Andreas H\u00fclsing Tanja Lange and Yuval Yarom. 2016. Flush Gauss and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme. In CHES. 323--345.","DOI":"10.1007\/978-3-662-53140-2_16"},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX Security.","author":"Gruss Daniel","unstructured":"Daniel Gruss, Raphael Spreitzer, and Stefan Mangard. 2015. Cache template attacks: Automating attacks on inclusive last-level caches. In USENIX Security. Washington, DC, US, 897--912."},{"key":"e_1_3_2_1_43_1","volume-title":"Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice","author":"Gullasch David","unstructured":"David Gullasch, Endre Bangerter, and Stephan Krenn. 2011. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice. In IEEE S&P. Oakland, CA, US, 490--505."},{"key":"e_1_3_2_1_44_1","first-page":"625","article-title":"Ed448-Goldilocks, a new elliptic curve","volume":"2015","author":"Hamburg Mike","year":"2015","unstructured":"Mike Hamburg. 2015. Ed448-Goldilocks, a new elliptic curve. IACR Cryptology ePrint Archive 2015 (2015), 625.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_45_1","volume-title":"Things that use Curve25519. https:\/\/ianix.com\/pub\/ curve25519-deployment.html. (March","author":"IANIX.","year":"2017","unstructured":"IANIX. 2017. Things that use Curve25519. https:\/\/ianix.com\/pub\/ curve25519-deployment.html. (March 2017)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Mehmet Sinan \u0141nci Berk G\u00fclmezoglu Gorka Irazoqui Thomas Eisenbarth and Berk Sunar. 2016. Cache Attacks Enable Bulk Key Recovery on the Cloud. In CHES. 368--388.","DOI":"10.1007\/978-3-662-53140-2_18"},{"key":"e_1_3_2_1_47_1","unstructured":"The Gpg4win Initiative. GpgOL. https:\/\/wiki.gnupg.org\/GpgOL"},{"key":"e_1_3_2_1_48_1","volume-title":"Thomas Eisenbarth, and Berk Sunar.","author":"Irazoqui Gorka","year":"2014","unstructured":"Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar. 2014. Wait a minute! A fast, Cross-VM attack on AES. In RAID. Gothenburg, Sweden, 299--319."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6637"},{"key":"e_1_3_2_1_50_1","volume-title":"Cryptographic Hardware and Embedded Systems (CHES)","author":"Joye Marc","year":"2002","unstructured":"Marc Joye and Sung-Ming Yen. 2002. The Montgomery Powering Ladder. In Cryptographic Hardware and Embedded Systems (CHES) 2002. Springer, 291--302."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_36"},{"key":"e_1_3_2_1_52_1","unstructured":"Cameron F Kerry and Charles Romine Director. 2013. NIST SP 186--4: Digital Signature Standard (DSS). (2013)."},{"key":"e_1_3_2_1_53_1","first-page":"257","article-title":"The Art of Computer Programming","volume":"2","author":"Knuth Donald E.","year":"1981","unstructured":"Donald E. Knuth. 1981. The Art of Computer Programming. Seminumeral Algorithms 2 (1981), 257--258.","journal-title":"Seminumeral Algorithms"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7748"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052240"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_57_1","volume-title":"Elliptic curve cryptography (ECC) Brainpool Standard Curves and Curve Generation. RFC 5639. (March","author":"Merkle Johannes","year":"2010","unstructured":"Johannes Merkle and Manfred Lochter. 2010. Elliptic curve cryptography (ECC) Brainpool Standard Curves and Curve Generation. RFC 5639. (March 2010)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"e_1_3_2_1_59_1","volume-title":"EUROCRYPT","volume":"4","author":"Nguyen Phong Q","year":"2004","unstructured":"Phong Q Nguyen. 2004. Can we trust cryptographic software? Cryptographic flaws in GNU Privacy Guard v1. 2.3. In EUROCRYPT, Vol. 4. Springer, 555--570."},{"key":"e_1_3_2_1_60_1","volume-title":"The 2003 Symposium on Cyptography and Information Security. In Japanese.","author":"Ohkuma K.","unstructured":"K. Ohkuma, S. Kawamura, H.Shimizu, and H. Muratani. 2003. Key Inference in a SideChannel Attack Based on Cache Miss. The 2003 Symposium on Cyptography and Information Security. In Japanese."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-46588-1_17"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"e_1_3_2_1_63_1","unstructured":"Colin Percival. 2005. Cache missing for fun and profit. (2005). Presented at BSDCan. http:\/\/www.daemonology.net\/hyperthreading-considered-harmful."},{"key":"e_1_3_2_1_64_1","volume-title":"Constant-Time Callees with Variable-Time Callers. In USENIX Security Symposium","author":"Garc\u00eda C\u00e9sar Pereida","year":"2017","unstructured":"C\u00e9sar Pereida Garc\u00eda and Billy Bob Brumley. 2017. Constant-Time Callees with Variable-Time Callers. In USENIX Security Symposium 2017. 83--98."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978420"},{"key":"e_1_3_2_1_66_1","volume-title":"X25519 and zero outputs. (May","author":"Perrin Trevor","year":"2017","unstructured":"Trevor Perrin. 2017. X25519 and zero outputs. (May 2017). https:\/\/moderncrypto.org\/mail-archive\/curves\/2017\/000896.html"},{"key":"e_1_3_2_1_67_1","first-page":"3","article-title":"Just a Little Bit More","volume":"2015","author":"van de Pol Joop","year":"2015","unstructured":"Joop van de Pol, Nigel P. Smart, and Yuval Yarom. 2015. Just a Little Bit More. In CT-RSA 2015. 3--21.","journal-title":"CT-RSA"},{"key":"e_1_3_2_1_68_1","unstructured":"The Enigmail Project. Enigmail: A simple interface for OpenPGP email security. https:\/\/www.enigmail.net"},{"key":"e_1_3_2_1_69_1","volume-title":"Leading zero bits in the Montgomery ladder. IETF mailing list. (July","author":"Ransom Robert","year":"2014","unstructured":"Robert Ransom. 2014. Leading zero bits in the Montgomery ladder. IETF mailing list. (July 2014). https:\/\/www.ietf.org\/mail-archive\/web\/cfrg\/current\/msg04749.html."},{"key":"e_1_3_2_1_70_1","volume-title":"Cryptanalysis of block ciphers implemented on computers with cache. preproceedings of ISITA 2002","author":"Tsunoo Yukiyasu","year":"2002","unstructured":"Yukiyasu Tsunoo. 2002. Cryptanalysis of block ciphers implemented on computers with cache. preproceedings of ISITA 2002 (2002)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_6"},{"key":"e_1_3_2_1_72_1","volume-title":"Mastik: A Micro-Architectural Side-Channel Toolkit","author":"Yarom Yuval","year":"2016","unstructured":"Yuval Yarom. 2016. Mastik: A Micro-Architectural Side-Channel Toolkit. http:\/\/cs.adelaide.edu.au\/~yval\/Mastik\/Mastik.pdf. (Sept. 2016)."},{"key":"e_1_3_2_1_74_1","volume-title":"USENIX Security Symposium","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security Symposium 2014. USENIX, 719--732."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554868_13"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978360"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134029","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134029","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:02Z","timestamp":1750212662000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134029"}},"subtitle":["A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":77,"alternative-id":["10.1145\/3133956.3134029","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134029","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}