~~NOTOC~~ ====== Keyword: Libraries ====== If you have published anything not in the list, please add the bibliography entry to the list. Instructions can be found in the [[https://gitlab.fi.muni.cz/labak/wiki-publications|GitLab repository]] Note down also the information on rejections and authorship percentages. We keep track of our lab efforts and author shares are useful for dissertation proposal/dissertation/habilitation/... There is a [[:internal:crocs:submissions|dedicated page where to write them]]. ==== 2024==== * **“These results must be false”: A usability evaluation of constant-time analysis tools**\\ [[:publications:authors:marcel-fourne|Marcel Fourné]], [[:publications:authors:daniel-de-almeida-braga|Daniel De Almeida Braga]], [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:mohamed-sabt|Mohamed Sabt]], [[:publications:authors:peter-schwabe|Peter Schwabe]], [[:publications:authors:gilles-barthe|Gilles Barthe]], [[:publications:authors:pierre-alain-fouque|Pierre-Alain Fouque]] and [[:publications:authors:yasemin-acar|Yasemin Acar]],\\ //Proceedings of the 33rd USENIX Security Symposium//, USENIX Association, 2024, to appear.\\ Keywords: [[:publications:keywords:constant-time|constant-time]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2024-usenix-jancar.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2024-usenix-jancar, title = {“These results must be false”: A usability evaluation of constant-time analysis tools}, author = {Marcel Fourné and Daniel De Almeida Braga and Jan Jancar and Mohamed Sabt and Peter Schwabe and Gilles Barthe and Pierre-Alain Fouque and Yasemin Acar}, booktitle = {Proceedings of the 33rd USENIX Security Symposium}, pages = {to appear}, publisher = {USENIX Association}, year = {2024}, keywords = {constant-time, cryptoimplementations, usablesec, libraries, side-channel}, } ++ ==== 2022==== * **“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks**\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:marcel-fourne|Marcel Fourné]], [[:publications:authors:daniel-de-almeida-braga|Daniel De Almeida Braga]], [[:publications:authors:mohamed-sabt|Mohamed Sabt]], [[:publications:authors:peter-schwabe|Peter Schwabe]], [[:publications:authors:gilles-barthe|Gilles Barthe]], [[:publications:authors:pierre-alain-fouque|Pierre-Alain Fouque]] and [[:publications:authors:yasemin-acar|Yasemin Acar]],\\ //43rd IEEE Symposium on Security and Privacy//, IEEE, 2022.\\ Keywords: [[:publications:keywords:constant-time|constant-time]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:usablesec|usablesec]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2022-sp-jancar.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2022-sp-jancar, title = {“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}, author = {Jan Jancar and Marcel Fourné and Daniel De Almeida Braga and Mohamed Sabt and Peter Schwabe and Gilles Barthe and Pierre-Alain Fouque and Yasemin Acar}, booktitle = {43rd IEEE Symposium on Security and Privacy}, publisher = {IEEE}, address = {San Francisco}, location = {San Francisco}, year = {2022}, keywords = {constant-time, cryptoimplementations, usablesec, libraries, side-channel}, language = {eng}, } ++ ==== 2021==== * **A formula for disaster: a unified approach to elliptic curve special-point-based attacks**\\ [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:jesus-javier-chi-dominguez|Jesús-Javier Chi-Domínguez]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:billy-bob-brumley|Billy Bob Brumley]],\\ //Advances in Cryptology – ASIACRYPT 2021//, Springer, 2021.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:side-channel|side-channel]], {{:publications:pdf:2021-asiacrypt-formulas.pdf|pre-print PDF}}, ++ BibTeX |@InProceedings{2021-asiacrypt-formulas, title = {A formula for disaster: a unified approach to elliptic curve special-point-based attacks}, author = {Vladimir Sedlacek and Jesús-Javier Chi-Domínguez and Jan Jancar and Billy Bob Brumley}, booktitle = {Advances in Cryptology – ASIACRYPT 2021}, publisher = {Springer}, year = {2021}, isbn = {978-3-030-64837-4}, keywords = {ECC, cryptoimplementations, libraries, side-channel}, } ++ ==== 2020==== * **Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces**\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]], [[:publications:authors:petr-svenda|Petr Svenda]] and [[:publications:authors:marek-sys|Marek Sys]],\\ //Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020//, Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems, 2020.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:smartcards|smartcards]], [[:publications:keywords:libraries|libraries]], [[:publications:keywords:leakage|leakage]], [[:publications:keywords:side-channel|side-channel]], [[:publications:keywords:cryptoimplementations|cryptoimplementations]], [[http://dx.doi.org/10.13154/tches.v2020.i4.281-308|DOI website]], ++ BibTeX |@InProceedings{2020-tches-minerva, title = {Minerva: The curse of ECDSA nonces; Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces}, author = {Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys}, booktitle = {Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020}, publisher = {Ruhr-University of Bochum, Transactions on Cryptographic Hardware and Embedded Systems}, year = {2020}, issn = {2569-2925}, doi = {10.13154/tches.v2020.i4.281-308}, keywords = {ECC, smartcards, libraries, leakage, side-channel, cryptoimplementations}, } ++