{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:36:51Z","timestamp":1767994611748,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["PQC4MED (FKZ 16KIS1045)"],"award-info":[{"award-number":["PQC4MED (FKZ 16KIS1045)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417889","type":"proceedings-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T16:20:42Z","timestamp":1614874842000},"page":"1033-1049","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis"],"prefix":"10.1145","author":[{"given":"Okan","family":"Seker","sequence":"first","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"given":"Sebastian","family":"Berndt","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"given":"Luca","family":"Wilke","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"2020 (accessed","author":"Alagic Gorjan","year":"2020"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_17"},{"key":"e_1_3_2_2_3_1","volume-title":"Quantum Attacks on Classical Proof Systems: The Hardness of Quantum Rewinding","author":"Ambainis Andris"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_5_1","volume-title":"Pierre-Alain Fouque, Benjamin Gr\u00e9 goire, and Francc ois-Xavier Standaert.","author":"Barthe Gilles","year":"2019"},{"key":"e_1_3_2_2_6_1","first-page":"506","article-title":"Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler","volume":"2015","author":"Barthe Gilles","year":"2015","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_7_1","volume-title":"Strong Non-Interference and Type-Directed Higher-Order Masking. In ACM Conference on Computer and Communications Security. ACM, 116--129","author":"Barthe Gilles","year":"2016"},{"key":"e_1_3_2_2_9_1","volume-title":"EUROCRYPT (2) (Lecture Notes in Computer Science","author":"Belaid Sonia"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45727-3_7"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_26"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133997"},{"key":"e_1_3_2_2_13_1","volume-title":"Report on post-quantum cryptography","author":"Chen Lily"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_24"},{"key":"e_1_3_2_2_15_1","volume-title":"FSE (Lecture Notes in Computer Science","volume":"424","author":"Coron Jean-S\u00e9bastien","year":"2013"},{"key":"e_1_3_2_2_16_1","volume-title":"Emmanuela Orsini, and Nigel P. Smart.","author":"de Saint Guilhem Cyprien Delpech","year":"2019"},{"key":"e_1_3_2_2_17_1","volume-title":"CRYPTO (2) (Lecture Notes in Computer Science","author":"Don Jelle"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9284-1"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.89-120"},{"key":"e_1_3_2_2_21_1","volume-title":"CRYPTO (Lecture Notes in Computer Science","volume":"194","author":"Fiat Amos","year":"1986"},{"key":"e_1_3_2_2_22_1","first-page":"267","article-title":"Differential Power Analysis of the Picnic Signature Scheme","volume":"2020","author":"Gellersen Tim","year":"2020","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_23_1","volume-title":"ZKBoo: Faster Zero-Knowledge for Boolean Circuits. In USENIX Security Symposium. USENIX Association, 1069--1083","author":"Giacomelli Irene","year":"2016"},{"key":"e_1_3_2_2_24_1","volume-title":"Foundations of cryptography","author":"Goldreich Oded"},{"key":"e_1_3_2_2_25_1","unstructured":"Gilbert Goodwill Benjamin Jun Josh Jaffe Pankaj Rohatgi etal 2011. A testing methodology for side-channel resistance validation. NIST non-invasive attack testing workshop https:\/\/csrc.nist.gov\/csrc\/media\/events\/non-invasive-attack-testing-workshop\/documents\/08_goodwill.pdf.  Gilbert Goodwill Benjamin Jun Josh Jaffe Pankaj Rohatgi et al. 2011. A testing methodology for side-channel resistance validation. NIST non-invasive attack testing workshop https:\/\/csrc.nist.gov\/csrc\/media\/events\/non-invasive-attack-testing-workshop\/documents\/08_goodwill.pdf."},{"key":"e_1_3_2_2_26_1","volume-title":"Constructing Non-malleable Commitments: A Black-Box Approach","author":"Goyal Vipul"},{"key":"e_1_3_2_2_27_1","volume-title":"Efficient secure two-party protocols: Techniques and constructions","author":"Hazay Carmit"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/080725398"},{"key":"e_1_3_2_2_29_1","volume-title":"Wagner","author":"Ishai Yuval","year":"2003"},{"key":"e_1_3_2_2_30_1","first-page":"427","article-title":"Improving the Performance of the Picnic Signature Scheme","volume":"2020","author":"Kales Daniel","year":"2020","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243805"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_2_35_1","volume-title":"CRYPTO (2) (Lecture Notes in Computer Science","author":"Liu Qipeng"},{"key":"e_1_3_2_2_36_1","unstructured":"Ventzi Nikov. 2020. Threshold Implementations against Physical Attacks an industry view. https:\/\/www.esat.kuleuven.be\/cosic\/events\/tis-online-workshop\/wp-content\/uploads\/sites\/6\/2020\/07\/Ventzi_Nikov.pdf Talk at Online Workshop on Threshold Schemes for NIST-approved Symmetric Block Ciphers in a Single-Device Setting.  Ventzi Nikov. 2020. Threshold Implementations against Physical Attacks an industry view. https:\/\/www.esat.kuleuven.be\/cosic\/events\/tis-online-workshop\/wp-content\/uploads\/sites\/6\/2020\/07\/Ventzi_Nikov.pdf Talk at Online Workshop on Threshold Schemes for NIST-approved Symmetric Block Ciphers in a Single-Device Setting."},{"key":"e_1_3_2_2_37_1","unstructured":"NIST. 2017 (accessed April 25 2020) a. Post-Quantum Cryptography -- Round 1 Submissions. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/ Round-1-Submissions  NIST. 2017 (accessed April 25 2020) a. Post-Quantum Cryptography -- Round 1 Submissions. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/ Round-1-Submissions"},{"key":"e_1_3_2_2_38_1","unstructured":"NIST. 2019 (accessed April 25 2020) b. Post-Quantum Cryptography -- Round 2 Submissions. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/ Round-2-Submissions  NIST. 2019 (accessed April 25 2020) b. Post-Quantum Cryptography -- Round 2 Submissions. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/ Round-2-Submissions"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"e_1_3_2_2_41_1","unstructured":"Sebastian Ramacher and Daniel Kales and Greg Zaverucha and Christian Paquin. [n.d.]. Picnic Signature Scheme Optimized Implementation. https:\/\/github.com\/IAIK\/Picnic .  Sebastian Ramacher and Daniel Kales and Greg Zaverucha and Christian Paquin. [n.d.]. Picnic Signature Scheme Optimized Implementation. https:\/\/github.com\/IAIK\/Picnic ."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"e_1_3_2_2_43_1","volume-title":"CARDIS (Lecture Notes in Computer Science","volume":"79","author":"Xavier Standaert Francc","year":"2018"},{"key":"e_1_3_2_2_44_1","unstructured":"Steven Goldfeder and Greg Zaverucha. [n.d.]. Picnic Signature Scheme Reference Implementation. https:\/\/github.com\/microsoft\/Picnic .  Steven Goldfeder and Greg Zaverucha. [n.d.]. Picnic Signature Scheme Reference Implementation. https:\/\/github.com\/microsoft\/Picnic ."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2724966.2725064"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_25"},{"key":"e_1_3_2_2_47_1","volume-title":"USENIX Security Symposium. USENIX Association, 719--732","author":"Yarom Yuval","year":"2014"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:32Z","timestamp":1750197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":45,"alternative-id":["10.1145\/3372297.3417889","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417889","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}