{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:09:32Z","timestamp":1765112972379,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the German Federal Ministry of Education and Research","award":["(BMBF) ( BBDC 2 (ref. 01IS18025A) and FLOQI (ID 16KIS1074)"],"award-info":[{"award-number":["(BMBF) ( BBDC 2 (ref. 01IS18025A) and FLOQI (ID 16KIS1074)"]}]},{"name":"the Deutsche Forschungsgemeinschaft (DFG)","award":["SFB 1119 ? 236615297"],"award-info":[{"award-number":["SFB 1119 ? 236615297"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3538980","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS"],"prefix":"10.1145","author":[{"given":"Soundes","family":"Marzougui","sequence":"first","affiliation":[{"name":"Technical University of Berlin, Germany"}]},{"given":"Nils","family":"Wisiol","sequence":"additional","affiliation":[{"name":"Technical University of Berlin, Germany"}]},{"given":"Patrick","family":"Gersch","sequence":"additional","affiliation":[{"name":"Technical University of Berlin, Germany"}]},{"given":"Juliane","family":"Kr\u00e4mer","sequence":"additional","affiliation":[{"name":"University of Regensburg, Germany"}]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[{"name":"Technical University of Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Erdem Alkim Joppe\u00a0W. Bos L\u00e9o Ducas Karen Easterbrook Brian LaMacchia Patrick Longa Ilya Mironov Michael Naehrig Valeria Nikolaenko Chris Peikert Ananth Raghunathan and Douglas Stebila. 2020. FrodoKEM: Learning with errors key encapsulation. https:\/\/frodokem.org\/. Submission to the NIST Post-Quantum Cryptography standardization project Round 3."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Gilles Barthe Sonia Bela\u00efd Thomas Espitau Pierre-Alain Fouque M\u00e9lissa Rossi and Mehdi Tibouchi.2019a. https:\/\/github.com\/espitau\/GALACTICS.","DOI":"10.1145\/3319535.3363223"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363223"},{"key":"e_1_3_2_1_4_1","volume-title":"Bernstein and Tanja Lange","author":"J.","year":"2008","unstructured":"Daniel\u00a0J. Bernstein and Tanja Lange. 2008. eBACS: ECRYPT Benchmarking of Cryptographic Systems. https:\/\/bench.cr.yp.to. [Online; accessed 15-March-2022]."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Joppe\u00a0W. Bos Craig Costello Michael Naehrig and Douglas Stebila. 2015. Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. 553-570\u00a0pages. https:\/\/doi.org\/10.1109\/SP.2015.40","DOI":"10.1109\/SP.2015.40"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Martin Brisfors Sebastian Forsmark and Elena Dubrova. 2020. How Deep Learning Helps Compromising USIM. 135\u2013150\u00a0pages. https:\/\/doi.org\/10.1007\/978-3-030-68487-7_9","DOI":"10.1007\/978-3-030-68487-7_9"},{"key":"e_1_3_2_1_7_1","volume-title":"strongSwan: the Open Source IPsec-based VPN Solution. https:\/\/github.com\/strongswan\/strongswan. [Online","author":"Brunner Tobias","year":"2022","unstructured":"Tobias Brunner. 2008. strongSwan: the Open Source IPsec-based VPN Solution. https:\/\/github.com\/strongswan\/strongswan. [Online; accessed 15-March-2022]."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"L. Devroye. 1986. Non-Uniform Random Variate Generation.","DOI":"10.1007\/978-1-4613-8643-8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"L\u00e9o Ducas Alain Durmus Tancr\u00e8de Lepoint and Vadim Lyubashevsky. 2013. Lattice Signatures and Bimodal Gaussians. 40\u201356\u00a0pages. https:\/\/doi.org\/10.1007\/978-3-642-40041-4_3","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"L\u00e9o Ducas Steven\u00a0D. Galbraith Thomas Prest and Yang Yu. 2020. Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats. 608\u2013637\u00a0pages.","DOI":"10.1007\/978-3-030-45724-2_21"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134028"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134028"},{"key":"e_1_3_2_1_13_1","volume-title":"Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU.","author":"Fouque Pierre-Alain","year":"2019","unstructured":"Pierre-Alain Fouque, J. Hoffstein, Paul Kirchner, Vadim Lyubashevsky, T. Pornin, T. Prest, Thomas Ricosset, Gregor Seiler, William Whyte, and Z. Zhang. 2019. Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU."},{"key":"e_1_3_2_1_14_1","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES","author":"Groot\u00a0Bruinderink Leon","year":"2016","unstructured":"Leon Groot\u00a0Bruinderink, Andreas H\u00fclsing, Tanja Lange, and Yuval Yarom. 2016. Flush, Gauss, and Reload \u2013 A Cache Attack on the BLISS Lattice-Based Signature Scheme. In Cryptographic Hardware and Embedded Systems \u2013 CHES 2016, Benedikt Gierlichs and Axel\u00a0Y. Poschmann (Eds.). Vol.\u00a09813. Springer Berlin Heidelberg, Berlin, Heidelberg, 323\u2013345."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Tim G\u00fcneysu Markus Krausz Tobias Oder and Julian Speith. 2018. Evaluation of Lattice-Based Signature Schemes in Embedded Systems. 385\u2013388. https:\/\/doi.org\/10.1109\/ICECS.2018.8617969","DOI":"10.1109\/ICECS.2018.8617969"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/app8101809"},{"key":"e_1_3_2_1_19_1","volume-title":"The Art of Computer Programming","author":"Knuth E.","unstructured":"Donald\u00a0E. Knuth. 1997. The Art of Computer Programming, Volume 2 (3rd Ed.): Seminumerical Algorithms. Addison-Wesley Longman Publishing Co., Inc., USA.","edition":"3"},{"volume-title":"Advances in Cryptology \u2014 CRYPTO","author":"Kocher Paul","key":"e_1_3_2_1_20_1","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology \u2014 CRYPTO\u2019 99, Michael Wiener (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 388\u2013397."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"e_1_3_2_1_23_1","first-page":"921","article-title":"Breaking Cryptographic Implementations Using Deep Learning Techniques","volume":"2016","author":"Maghrebi Houssem","year":"2016","unstructured":"Houssem Maghrebi, Thibault Portigliatti, and E. Prouff. 2016. Breaking Cryptographic Implementations Using Deep Learning Techniques. IACR Cryptol. ePrint Arch. 2016 (2016), 921.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Daniele Micciancio and Michael Walter. 2017. Gaussian Sampling over the Integers: Efficient Generic Constant-Time. 455\u2013485\u00a0pages.","DOI":"10.1007\/978-3-319-63715-0_16"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Peter Pessl. 2016. Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures. 153\u2013170\u00a0pages.","DOI":"10.1007\/978-3-319-49890-4_9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134023"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134023"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_20"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"Oscar Reparaz Josep Balasch and Ingrid Verbauwhede. 2017. Dude is my code constant time? 1697-1702\u00a0pages. https:\/\/doi.org\/10.23919\/DATE.2017.7927267","DOI":"10.23919\/DATE.2017.7927267"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0149-6"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029521"},{"key":"e_1_3_2_1_32_1","unstructured":"Andreas Steffen March 2017. strongSwan: the Open Source IPsec-based VPNSolution (version 5.5.2). https:\/\/www.strongswan.org."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2020-0079"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2940949"}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","acronym":"ARES 2022","location":"Vienna Austria"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3538980","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3538980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:40Z","timestamp":1750183780000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3538980"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":33,"alternative-id":["10.1145\/3538969.3538980","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3538980","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}