{"id":"https://openalex.org/W3200359391","doi":"https://doi.org/10.1145/3538969.3538980","title":"Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS","display_name":"Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS","publication_year":2022,"publication_date":"2022-08-17","ids":{"openalex":"https://openalex.org/W3200359391","doi":"https://doi.org/10.1145/3538969.3538980","mag":"3200359391"},"language":"en","primary_location":{"id":"doi:10.1145/3538969.3538980","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3538980","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://arxiv.org/pdf/2109.09461.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052881645","display_name":"Soundes Marzougui","orcid":"https://orcid.org/0000-0003-2191-172X"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Soundes Marzougui","raw_affiliation_strings":["Technical University of Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007833679","display_name":"Nils Wisiol","orcid":"https://orcid.org/0000-0003-2606-614X"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nils Wisiol","raw_affiliation_strings":["Technical University of Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063153600","display_name":"Patrick Gersch","orcid":"https://orcid.org/0000-0001-8898-7353"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Patrick Gersch","raw_affiliation_strings":["Technical University of Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061353492","display_name":"Juliane Kr\u00e4mer","orcid":"https://orcid.org/0000-0002-3599-4215"},"institutions":[{"id":"https://openalex.org/I60668342","display_name":"University of Regensburg","ror":"https://ror.org/01eezs655","country_code":"DE","type":"education","lineage":["https://openalex.org/I60668342"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Juliane Kr\u00e4mer","raw_affiliation_strings":["University of Regensburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Regensburg, Germany","institution_ids":["https://openalex.org/I60668342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001159554","display_name":"Jean\u2010Pierre Seifert","orcid":"https://orcid.org/0000-0002-5372-4825"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Seifert","raw_affiliation_strings":["Technical University of Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5052881645"],"corresponding_institution_ids":["https://openalex.org/I4577782"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00153708,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bliss","display_name":"BLISS","score":0.8789847493171692},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7523629665374756},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7122173309326172},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5803434252738953},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.5574877262115479},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.4972727596759796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49622637033462524},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4748166799545288},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4286332130432129},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4122188687324524},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.37200579047203064},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3419485092163086},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3078932762145996},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0999288558959961}],"concepts":[{"id":"https://openalex.org/C2780658912","wikidata":"https://www.wikidata.org/wiki/Q2877155","display_name":"BLISS","level":2,"score":0.8789847493171692},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7523629665374756},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7122173309326172},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5803434252738953},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.5574877262115479},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.4972727596759796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49622637033462524},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4748166799545288},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4286332130432129},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4122188687324524},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.37200579047203064},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3419485092163086},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3078932762145996},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0999288558959961},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1145/3538969.3538980","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3538980","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"mag:3200359391","is_oa":true,"landing_page_url":"http://arxiv.org/pdf/2109.09461.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:depositonce.tu-berlin.de:11303/22560","is_oa":false,"landing_page_url":"https://depositonce.tu-berlin.de/handle/11303/22560","pdf_url":null,"source":{"id":"https://openalex.org/S4406922277","display_name":"DepositOnce","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"acceptedVersion"},{"id":"pmh:oai:epub.uni-regensburg.de:53765","is_oa":false,"landing_page_url":"https://epub.uni-regensburg.de/53765/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401229","display_name":"University of Regensburg Publication Server (University of Regensburg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60668342","host_organization_name":"University of Regensburg","host_organization_lineage":["https://openalex.org/I60668342"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:publica.fraunhofer.de:publica/414354","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/414354","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"paper"},{"id":"doi:10.48550/arxiv.2109.09461","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2109.09461","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"},{"id":"doi:10.14279/depositonce-21361","is_oa":true,"landing_page_url":"https://doi.org/10.14279/depositonce-21361","pdf_url":null,"source":{"id":"https://openalex.org/S7407052985","display_name":"Technische Universit\u00e4t Berlin \u2013 Universit\u00e4tsbibliothek","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"mag:3200359391","is_oa":true,"landing_page_url":"http://arxiv.org/pdf/2109.09461.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W72736654","https://openalex.org/W121367636","https://openalex.org/W191000419","https://openalex.org/W1506156414","https://openalex.org/W1549962104","https://openalex.org/W1595771334","https://openalex.org/W1774054610","https://openalex.org/W2007466965","https://openalex.org/W2141040012","https://openalex.org/W2152828142","https://openalex.org/W2154909745","https://openalex.org/W2552357046","https://openalex.org/W2556867355","https://openalex.org/W2571657973","https://openalex.org/W2597472572","https://openalex.org/W2613335035","https://openalex.org/W2765255210","https://openalex.org/W2765784230","https://openalex.org/W2891841929","https://openalex.org/W2895332594","https://openalex.org/W2900370870","https://openalex.org/W2903143476","https://openalex.org/W2914925470","https://openalex.org/W2941530069","https://openalex.org/W2972538228","https://openalex.org/W2989065323","https://openalex.org/W3083887424","https://openalex.org/W3092436054","https://openalex.org/W3110821325","https://openalex.org/W3111297213","https://openalex.org/W3123261092","https://openalex.org/W3127035137"],"related_works":["https://openalex.org/W3097673332","https://openalex.org/W2294518244","https://openalex.org/W3030577981","https://openalex.org/W2621279043","https://openalex.org/W3095549427","https://openalex.org/W3033121846","https://openalex.org/W566010743","https://openalex.org/W3206090670","https://openalex.org/W2033856124","https://openalex.org/W96636354","https://openalex.org/W3030183593","https://openalex.org/W3198350797","https://openalex.org/W3025461878","https://openalex.org/W2148765896","https://openalex.org/W1849065680","https://openalex.org/W3170722885","https://openalex.org/W3028997697","https://openalex.org/W3033758619","https://openalex.org/W2293003904","https://openalex.org/W2080672785"],"abstract_inverted_index":{"Due":[0],"to":[1,31,71,90],"the":[2,18,53,76],"advancing":[3],"development":[4],"of":[5,52,78],"quantum":[6,35],"computers,":[7],"practical":[8],"attacks":[9,36,92],"on":[10],"conventional":[11,46],"public-key":[12],"cryptography":[13],"may":[14],"become":[15],"feasible":[16],"in":[17,58],"next":[19],"few":[20],"decades.":[21],"To":[22],"address":[23],"this":[24,59],"risk,":[25],"post-quantum":[26,55],"schemes":[27,57],"that":[28],"are":[29,37,42],"assumed":[30],"be":[32,72],"secure":[33,87],"against":[34],"being":[38,50],"developed.":[39],"Lattice-based":[40],"algorithms":[41],"promising":[43],"replacements":[44],"for":[45,75],"schemes,":[47],"with":[48,88],"BLISS":[49],"one":[51],"earliest":[54],"signature":[56],"family.":[60],"However,":[61],"required":[62],"subroutines":[63],"such":[64],"as":[65],"Gaussian":[66,82],"sampling":[67,83],"have":[68],"been":[69],"demonstrated":[70],"a":[73],"risk":[74],"security":[77],"BLISS,":[79],"since":[80],"implementing":[81],"both":[84],"efficient":[85],"and":[86],"respect":[89],"physical":[91],"is":[93],"challenging.":[94]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
