aboutsummaryrefslogtreecommitdiff
path: root/src/resources/riscv-spec.bib
diff options
context:
space:
mode:
Diffstat (limited to 'src/resources/riscv-spec.bib')
-rw-r--r--src/resources/riscv-spec.bib1935
1 files changed, 976 insertions, 959 deletions
diff --git a/src/resources/riscv-spec.bib b/src/resources/riscv-spec.bib
index 16e6b38..d5b77d3 100644
--- a/src/resources/riscv-spec.bib
+++ b/src/resources/riscv-spec.bib
@@ -34,7 +34,7 @@
pages = {138--152},
publisher = {Computer Science Press, Inc.},
address = {New York, NY, USA},
-}
+}
@inproceedings{Ungar:1984,
author = {David Ungar and Ricki Blau and Peter Foley and Dain Samples
@@ -44,7 +44,7 @@
address = {Ann Arbor, MI},
year = {1984},
pages = {188--197}
-}
+}
@Article{spur-jsscc1989,
author = {David D. Lee and Shing I. Kong and Mark D. Hill and
@@ -140,52 +140,52 @@
month = {December},
year = 2012}
-@ARTICLE{tremblay-vis-ieeemicro1996,
-author={Tremblay, M. and O'Connor, J.M. and Narayanan, V. and Liang He},
-journal={IEEE Micro},
-title={{VIS} speeds new media processing},
-year={1996},
-month=AUG,
-volume={16},
-number={4},
-pages={10 -20},
-keywords={3D graphics environments;RISC-style instructions;UltraSparc;VIS;Visual Instruction Set;media processing;media-processing algorithms;computer graphics;instruction sets;reduced instruction set computing;},
+@ARTICLE{tremblay-vis-ieeemicro1996,
+author={Tremblay, M. and O'Connor, J.M. and Narayanan, V. and Liang He},
+journal={IEEE Micro},
+title={{VIS} speeds new media processing},
+year={1996},
+month=AUG,
+volume={16},
+number={4},
+pages={10 -20},
+keywords={3D graphics environments;RISC-style instructions;UltraSparc;VIS;Visual Instruction Set;media processing;media-processing algorithms;computer graphics;instruction sets;reduced instruction set computing;},
ISSN={0272-1732},}
-@ARTICLE{lee-max-ieeemicro1996,
-author={Lee, R.B.},
-journal={IEEE Micro},
-title={Subword parallelism with {MAX-2}},
-year={1996},
-month=AUG,
-volume={16},
-number={4},
-pages={51 -59},
-keywords={MAX-2;instruction extensions;media processing;parallel computation;subword parallelism;word-oriented general-purpose processor;instruction sets;multimedia computing;parallel processing;},
+@ARTICLE{lee-max-ieeemicro1996,
+author={Lee, R.B.},
+journal={IEEE Micro},
+title={Subword parallelism with {MAX-2}},
+year={1996},
+month=AUG,
+volume={16},
+number={4},
+pages={51 -59},
+keywords={MAX-2;instruction extensions;media processing;parallel computation;subword parallelism;word-oriented general-purpose processor;instruction sets;multimedia computing;parallel processing;},
ISSN={0272-1732},}
-@ARTICLE{peleg-mmx-ieeemicro1996,
-author={Peleg, A. and Weiser, U.},
-journal={IEEE Micro},
-title={{MMX} technology extension to the {Intel} architecture},
-year={1996},
-month=AUG,
-volume={16},
-number={4},
-pages={42 -50},
+@ARTICLE{peleg-mmx-ieeemicro1996,
+author={Peleg, A. and Weiser, U.},
+journal={IEEE Micro},
+title={{MMX} technology extension to the {Intel} architecture},
+year={1996},
+month=AUG,
+volume={16},
+number={4},
+pages={42 -50},
keywords={Intel architecture;MMX;SIMD;communications;compatibility;multimedia;operating systems;microprocessor chips;parallel architectures;},
ISSN={0272-1732},}
-@ARTICLE{raman-sse-ieeemicro2000,
-author={Raman, S.K. and Pentkovski, V. and Keshava, J.},
-journal={IEEE Micro},
-title={Implementing streaming {SIMD} extensions on the {Pentium}-{III} processor },
-year={2000},
+@ARTICLE{raman-sse-ieeemicro2000,
+author={Raman, S.K. and Pentkovski, V. and Keshava, J.},
+journal={IEEE Micro},
+title={Implementing streaming {SIMD} extensions on the {Pentium}-{III} processor },
+year={2000},
month=JUL/AUG,
-volume={20},
-number={4},
-pages={47 -57},
-keywords={Internet;Pentium III developers;demanding multimedia;die size constraints;streaming SIMD extensions;instruction sets;microprocessor chips;},
+volume={20},
+number={4},
+pages={47 -57},
+keywords={Internet;Pentium III developers;demanding multimedia;die size constraints;streaming SIMD extensions;instruction sets;microprocessor chips;},
ISSN={0272-1732},}
@misc{lomont-avx-irm2011,
@@ -195,28 +195,28 @@ howpublished = {Intel White Paper},
year = {2011},
}
-@ARTICLE{goodacre-armisa-computer2005,
-author={Goodacre, J. and Sloss, A.N.},
-journal={Computer},
-title={Parallelism and the {ARM} instruction set architecture},
-year={2005},
+@ARTICLE{goodacre-armisa-computer2005,
+author={Goodacre, J. and Sloss, A.N.},
+journal={Computer},
+title={Parallelism and the {ARM} instruction set architecture},
+year={2005},
month=JULY,
-volume={38},
-number={7},
-pages={ 42 - 50},
-keywords={ ARM RISC processor; ARM chip design; ARM instruction set architecture; digital signal processor-like operations; exception handling; multiprocessing; reduced-instruction-set computing; subword parallelism; thread-level parallelism; variable execution time; instruction sets; microprocessor chips; parallel architectures; parallel programming; reduced instruction set computing;},
+volume={38},
+number={7},
+pages={ 42 - 50},
+keywords={ ARM RISC processor; ARM chip design; ARM instruction set architecture; digital signal processor-like operations; exception handling; multiprocessing; reduced-instruction-set computing; subword parallelism; thread-level parallelism; variable execution time; instruction sets; microprocessor chips; parallel architectures; parallel programming; reduced instruction set computing;},
ISSN={0018-9162},}
-@ARTICLE{diefendorff-altivec-ieeemicro2000,
-author={Diefendorff, K. and Dubey, P.K. and Hochsprung, R. and Scale, H.},
+@ARTICLE{diefendorff-altivec-ieeemicro2000,
+author={Diefendorff, K. and Dubey, P.K. and Hochsprung, R. and Scale, H.},
journal={IEEE Micro},
-title={{AltiVec} extension to {PowerPC} accelerates media processing},
-year={2000},
+title={{AltiVec} extension to {PowerPC} accelerates media processing},
+year={2000},
month=MAR/APR,
-volume={20},
-number={2},
-pages={85 -95},
-keywords={2D image processing;3D graphics;AltiVec extension;Apple G4;Hewlett-Packard added MAX;MDMX;MIPS architecture;MMX;Motorola's MPC 7400;PA-RISC architecture;PowerPC;PowerPC's AltiVec;SSE;Silicon Graphics;Sun enhanced Sparc;alias KNI;handwriting recognition;media mining;media processing;multimedia technologies;narrow/broadband signal processing;personal computing;digital signal processing chips;handwriting recognition;multimedia systems;parallel architectures;},
+volume={20},
+number={2},
+pages={85 -95},
+keywords={2D image processing;3D graphics;AltiVec extension;Apple G4;Hewlett-Packard added MAX;MDMX;MIPS architecture;MMX;Motorola's MPC 7400;PA-RISC architecture;PowerPC;PowerPC's AltiVec;SSE;Silicon Graphics;Sun enhanced Sparc;alias KNI;handwriting recognition;media mining;media processing;multimedia technologies;narrow/broadband signal processing;personal computing;digital signal processing chips;handwriting recognition;multimedia systems;parallel architectures;},
ISSN={0272-1732},}
@misc{gwennap-mdmx-mpr1996,
@@ -237,7 +237,7 @@ year = {1996},
pages = {12--25},
publisher = {IEEE Computer Society Press},
address = {Los Alamitos, CA, USA},
-}
+}
@InProceedings{tx2,
author = {John M. Frankovich and H. Philip Peterson},
@@ -263,7 +263,7 @@ year = {1996},
series = {PACT '98},
year = {1998},
address = {Washington, DC, USA},
-}
+}
@inproceedings{Kim-micro2005,
author = {Kim, Hyesoon and Mutlu, Onur and Stark, Jared and Patt, Yale N.},
@@ -273,16 +273,16 @@ year = {1996},
year = {2005},
location = {Barcelona, Spain},
pages = {43--54},
-}
+}
@INPROCEEDINGS{Gharachorloo90memoryconsistency,
author = {Kourosh Gharachorloo and Daniel Lenoski and James Laudon
and Phillip Gibbons and Anoop Gupta and John
- Hennessy},
+ Hennessy},
title = {Memory Consistency and Event Ordering in Scalable
- Shared-Memory Multiprocessors},
+ Shared-Memory Multiprocessors},
booktitle = {In Proceedings of the 17th Annual International
- Symposium on Computer Architecture},
+ Symposium on Computer Architecture},
year = {1990},
pages = {15--26}
}
@@ -297,7 +297,7 @@ year = {1996},
location = {Austin, Texas},
pages = {294--305},
publisher = {IEEE Computer Society},
-}
+}
@Misc{sparcieee1994,
title = {{IEEE} Standard for a 32-bit microprocessor},
@@ -342,16 +342,16 @@ year = {1996},
numpages = {9},
publisher = {ACM},
address = {New York, NY, USA},
-}
+}
@ARTICLE{goldbergvm,
-author={Goldberg, Robert P.},
-journal={Computer},
-title={Survey of virtual machine research},
-year={1974},
-month={June},
-volume={7},
-number={6},
+author={Goldberg, Robert P.},
+journal={Computer},
+title={Survey of virtual machine research},
+year={1974},
+month={June},
+volume={7},
+number={6},
pages={34-45}
}
@@ -381,7 +381,7 @@ pages={34-45}
acmid = {844138},
publisher = {ACM},
address = {New York, NY, USA},
-}
+}
@Book{stretch,
author = "Werner Buchholz",
@@ -407,7 +407,7 @@ pages={34-45}
year = {1965},
location = {San Francisco, California},
pages = {33--40}
-}
+}
@InProceedings{jtseng:sbbci,
author = {J. Tseng and K. Asanovi\'c},
@@ -480,22 +480,22 @@ pages={34-45}
}
-@inproceedings{lithe-pan-hotpar09,
+@inproceedings{lithe-pan-hotpar09,
author = {Heidi Pan and Benjamin Hindman and Krste Asanovi\'c},
title = {{Lithe}: Enabling Efficient Composition of Parallel Libraries},
booktitle = {Proceedings of the 1st USENIX Workshop on Hot Topics in Parallelism (HotPar~'09)},
month = {March},
year = {2009},
-address = {Berkeley, CA}}
+address = {Berkeley, CA}}
-@inproceedings{lithe-pan-pldi10,
+@inproceedings{lithe-pan-pldi10,
author = {Heidi Pan and Benjamin Hindman and Krste Asanovi\'c},
title = {Composing Parallel Software Efficiently with {Lithe}},
booktitle = {31st Conference on Programming Language Design and Implementation},
month = {June},
year = {2010},
-address = {Toronto, Canada}}
+address = {Toronto, Canada}}
@article{roux:hal-01091186,
TITLE = {{Innocuous Double Rounding of Basic Arithmetic Operations}},
@@ -606,7 +606,7 @@ address = {Toronto, Canada}}
}
@misc{nist:fips:197,
- author = {{NIST}},
+ author = {{NIST}},
title = {{Advanced} {Encryption} {Standard} ({AES})},
howpublished = {Federal Information Processing Standards Publication FIPS
197},
@@ -650,7 +650,7 @@ address = {Toronto, Canada}}
@Misc{gbt:sm4,
title = {{GB}/{T} 32907-2016: {SM4} Block Cipher Algorithm},
- howpublished = {Also {GM}/{T} 0002-2012. Standardization Administration of China},
+ howpublished = {Also {GM}/{T} 0002-2012. Standardization Administration of China},
url = {http://www.gmbz.org.cn/upload/2018-04-04/1522788048733065051.pdf},
month = {August},
year = {2016}
@@ -659,7 +659,7 @@ address = {Toronto, Canada}}
@Misc{iso:sm3,
author = {ISO/IEC},
title = {IT Security techniques -- Hash-functions -- Part 3:
- Dedicated hash-functions},
+ Dedicated hash-functions},
howpublished = {{ISO}/{IEC} Standard 10118-3:2018},
year = {2018}
}
@@ -750,7 +750,7 @@ pages={109-136}
%
-% Block Cipher Specifiations
+% Block Cipher Specifications
% -----------------------------------------------------------------
@inproceedings{block:prince,
@@ -884,683 +884,683 @@ pages={109-136}
% -----------------------------------------------------------------
-@Misc{ AM17,
- author = {{AMD}},
- title = {{AMD} Random Number Generator},
- howpublished = {AMD TechDocs},
- publisher = {Advanced Micro Devices},
- url = {https://www.amd.com/system/files/TechDocs/amd-random-number-generator.pdf},
- month = {June},
- year = {2017}
-}
-
-@Misc{ AR17,
- author = {{ARM}},
- title = {ARM TrustZone True Random Number Generator: Technical Reference Manual},
- howpublished = {ARM 100976\_0000\_00\_en (rev. r0p0)},
- publisher = {{ARM}},
- url = {http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100976_0000_00_en},
- month = {May},
- year = {2017}
-}
-
-@Misc{ AR20,
- author = {{ARM}},
- title = {Arm Architecture Registers: Armv8, for Armv8-A
- architecture profile},
- howpublished = {ARM DDI 0595 (ID033020)},
- publisher = {{ARM}},
- url = {https://developer.arm.com/docs/ddi0595/g},
- month = {April},
- year = {2020}
-}
-
-@Book{ An20,
- author = {Ross J. Anderson},
- title = {Security engineering - a guide to building dependable
- distributed systems {(3.} ed.)},
- publisher = {Wiley},
- isbn = {978-1-119-64278-7},
- url = {https://www.cl.cam.ac.uk/~rja14/book.html},
- month = {December},
- year = {2020}
-}
-
-@Misc{ BS13,
- author = {{BSI}},
- title = {Evaluation of random number generators},
- howpublished = {Version 0.10, BSI},
- url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_AIS_31_Evaluation_of_random_number_generators_e.html},
- publisher = {BSI},
- month = {March},
- year = {2013}
-}
-
-@Misc{ Ba20,
- author = {Elaine Barker},
- title = {Recommendation for Key Management: Part 1 -- General},
- howpublished = {NIST Special Publication SP 0 Part 1, Revision 5},
- doi = {10.6028/NIST.SP.800-57pt1r5},
- publisher = {{NIST}},
- month = {May},
- year = {2020}
-}
-
-@Article{ Ba86,
- author = {Per Bak},
- title = {The Devil's Staircase},
- journal = {Phys. Today},
- volume = {39},
- number = {12},
- pages = {38--45},
- doi = {10.1063/1.881047},
- publisher = {{AIP}},
- month = {December},
- year = {1986}
-}
-
-@Misc{ BaBa19,
- author = {Elaine Barker and William Barker},
- title = {Recommendation for Key Management: Part 2 -- Best
- Practices for Key Management Organizations},
- howpublished = {NIST Special Publication SP 800-57 Part 2, Revision 1},
- doi = {10.6028/NIST.SP.800-57pt2r1},
- publisher = {{NIST}},
- month = {May},
- year = {2019}
-}
-
-@Misc{ BaDa15,
- author = {Elaine Barker and Quynh Dang},
- title = {Recommendation for Key Management, Part 3:
- Application-Specific Key Management Guidance},
- howpublished = {NIST Special Publication SP 800-57 Part 3, Revision 1},
- doi = {10.6028/NIST.SP.800-57pt3r1},
- publisher = {{NIST}},
- month = {January},
- year = {2015}
-}
-
-@InProceedings{ BaFoKa:12,
- author = {Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and
- Lorenzo Simionato and Graham Steel and Joe{-}Kai Tsay},
- title = {Efficient Padding Oracle Attacks on Cryptographic
- Hardware},
- booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual
- Cryptology Conference, Santa Barbara, CA, USA, August
- 19-23, 2012. Proceedings},
- pages = {608--625},
- crossref = {_SaCa12},
- doi = {10.1007/978-3-642-32009-5\_36},
- year = {2012}
-}
-
-@Misc{ BaKe15,
- author = {Elaine Barker and John Kelsey},
- title = {Recommendation for Random Number Generation Using
- Deterministic Random Bit Generators},
- howpublished = {NIST Special Publication SP 800-90A Revision 1},
- doi = {10.6028/NIST.SP.800-90Ar1},
- month = {June},
- year = {2015}
-}
-
-@Misc{ BaKeRo:21,
- author = {Elaine Barker and John Kelsey and Allen Roginsky and
- Meltem Sönmez Turan and Darryl Buller and Aaron Kaufer},
- title = {Recommendation for Random Bit Generator ({RBG})
- Constructions},
- howpublished = {Draft NIST Special Publication SP 800-90C},
- month = {March},
- year = {2021}
-}
-
-@Article{ BaLuMi:11,
- author = {Mathieu Baudet and David Lubicz and Julien Micolod and
- Andr{\'{e}} Tassiaux},
- title = {On the Security of Oscillator-Based Random Number
- Generators},
- journal = {J. Cryptology},
- volume = {24},
- number = {2},
- pages = {398--425},
- doi = {10.1007/s00145-010-9089-3},
- year = {2011}
-}
-
-@Article{ BeRePa:14,
- author = {Georg T. Becker and Francesco Regazzoni and Christof Paar
- and Wayne P. Burleson},
- title = {Stealthy dopant-level hardware Trojans: extended version},
- journal = {J. Cryptographic Engineering},
- volume = {4},
- number = {1},
- pages = {19--31},
- publisher = {Springer},
- doi = {10.1007/s13389-013-0068-0},
- year = {2014}
-}
-
-@Article{ Bl86,
- author = {Manuel Blum},
- title = {Independent unbiased coin flips from a correlated biased
- source -- A finite state Markov chain},
- journal = {Combinatorica},
- volume = {6},
- number = {2},
- pages = {97--108},
- doi = {10.1007/BF02579167},
- year = {1986}
-}
-
-@Article{ BlBlSh86,
- author = {Lenore Blum and Manuel Blum and Mike Shub},
- title = {A Simple Unpredictable Pseudo-Random Number Generator},
- journal = {{SIAM} J. Comput.},
- volume = {15},
- number = {2},
- pages = {364--383},
- doi = {10.1137/0215025},
- publisher = {{SIAM}},
- year = {1986}
-}
-
-@InProceedings{ ChMaGa:16,
- author = {Stephen Checkoway and Jacob Maskiewicz and Christina
- Garman and Joshua Fried and Shaanan Cohney and Matthew
- Green and Nadia Heninger and Ralf{-}Philipp Weinmann and
- Eric Rescorla and Hovav Shacham},
- title = {A Systematic Analysis of the Juniper Dual {EC} Incident},
- booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on
- Computer and Communications Security, Vienna, Austria,
- October 24-28, 2016},
- pages = {468--479},
- crossref = {_WeKaKr:16},
- doi = {10.1145/2976749.2978395},
- year = {2016}
-}
-
-@Article{ ChMaGa:18,
- author = {Stephen Checkoway and Jacob Maskiewicz and Christina
- Garman and Joshua Fried and Shaanan Cohney and Matthew
- Green and Nadia Heninger and Ralf{-}Philipp Weinmann and
- Eric Rescorla and Hovav Shacham},
- title = {Where did {I} leave my keys?: lessons from the Juniper
- Dual {EC} incident},
- journal = {Commun. {ACM}},
- volume = {61},
- number = {11},
- pages = {148--155},
- publisher = {{ACM}},
- doi = {10.1145/3266291},
- year = {2018}
-}
-
-@Misc{ Cr17,
- author = {Common Criteria},
- title = {Common Methodology for Information Technology Security
- Evaluation: Evaluation methodology},
- howpublished = {Specification: Version 3.1 Revision 5},
- url = {https://commoncriteriaportal.org/cc/},
- month = {April},
- year = {2017}
-}
-
-@Misc{ Da02,
- author = {Robert B. Davies},
- title = {Exclusive OR (XOR) and hardware random number generators},
- howpublished = {Author-hosted manuscript},
- url = {http://www.robertnz.net/pdf/xor2.pdf},
- month = {February},
- year = {2002}
-}
-
-@Book{ DaRo58,
- author = {Wilbur B. Davenport Jr. and William L. Root},
- title = {An Introduction to the Theory of Random Signals and
- Noise},
- url = {https://ieeexplore.ieee.org/servlet/opac?bknumber=5265617},
- pages = {401},
- publisher = {McGraw-Hill},
- year = {1958}
-}
-
-@Article{ El72,
- author = {Peter Elias},
- title = {The Efficient Construction of an Unbiased Random
- Sequence},
- journal = {Ann. Math. Statist.},
- volume = {43},
- number = {3},
- pages = {865--870},
- doi = {10.1214/aoms/1177692552},
- publisher = {Institute of Mathematical Statistics},
- year = {1972}
-}
-
-@InProceedings{ EvPo16,
- author = {Dmitry Evtyushkin and Dmitry V. Ponomarev},
- title = {Covert Channels through Random Number Generator:
- Mechanisms, Capacity Estimation and Mitigations},
- booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on
- Computer and Communications Security, Vienna, Austria,
- October 24-28, 2016},
- pages = {843--857},
- crossref = {_WeKaKr:16},
- doi = {10.1145/2976749.2978374},
- year = {2016}
-}
-
-@InProceedings{ Gr96,
- author = {Lov K. Grover},
- title = {A Fast Quantum Mechanical Algorithm for Database Search},
- booktitle = {Proceedings of the Twenty-eighth Annual ACM Symposium on
- Theory of Computing},
- series = {STOC '96},
- pages = {212--219},
- url = {http://arxiv.org/pdf/quant-ph/9605043},
- doi = {10.1145/237814.237866},
- publisher = {{ACM}},
- year = 1996
-}
-
-@InProceedings{ GrLaRo:16,
- author = {Markus Grassl and Brandon Langenberg and Martin Roetteler
- and Rainer Steinwandt},
- title = {Applying Grover's Algorithm to {AES:} Quantum Resource
- Estimates},
- booktitle = {Post-Quantum Cryptography - 7th International Workshop,
- PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016,
- Proceedings},
- pages = {29--43},
- crossref = {_Ta16},
- url = {https://arxiv.org/pdf/1512.04965.pdf},
- doi = {10.1007/978-3-319-29360-8\_3},
- year = {2016}
-}
-
-@Misc{ HaKoMa12,
- author = {Mike Hamburg and Paul Kocher and Mark E. Marson},
- title = {Analysis of Intel's Ivy Bridge Digital Random Number
- Generator},
- howpublished = {Technical Report, Cryptography Research (Prepared for
- Intel)},
- month = {March},
- year = {2012}
-}
-
-@Article{ HaLe98,
- author = {Ali Hajimiri and Thomas H. Lee},
- title = {A general theory of phase noise in electrical
- oscillators},
- journal = {IEEE Journal of Solid-State Circuits},
- volume = {33},
- number = {2},
- pages = {179--194},
- publisher = {{IEEE}},
- doi = {10.1109/4.658619},
- year = {1998}
-}
-
-@Article{ HaLiLe99,
- author = {Ali Hajimiri and Sotirios Limotyrakis and Thomas H. Lee},
- title = {Jitter and phase noise in ring oscillators},
- journal = { {IEEE} Journal of Solid-State Circuits},
- volume = {34},
- number = {6},
- doi = {10.1109/4.766813},
- url = {https://authors.library.caltech.edu/4916/1/HAJieeejssc99a.pdf},
- pages = {790--804},
- month = {June},
- year = {1999}
-}
-
-@Article{ HuHe20,
- author = {Darren Hurley-Smith and Julio C\'esar Hern\'andez-Castro},
- title = {Quantum Leap and Crash: Searching and Finding Bias in
- Quantum Random Number Generators},
- journal = {ACM Transactions on Privacy and Security},
- volume = {23},
- number = {3},
- pages = {1--25},
- doi = {10.1145/3403643},
- publisher = {{ACM}},
- month = {June},
- year = {2020}
-}
-
-@TechReport{ IS16,
- author = {{ISO}},
- type = {Standard},
- title = {Information technology -- Security techniques -- Testing
- methods for the mitigation of non-invasive attack classes
- against cryptographic modules},
- shorttitle = {{ISO}/{IEC} 17825:2016},
- language = {en},
- number = {ISO/IEC 17825:2016},
- institution = {International Organization for Standardization},
- year = {2016}
-}
-
-@Misc{ IT19,
- author = {ITU},
- title = {Quantum noise random number generator architecture},
- howpublished = {Recommendation ITU-T X.1702},
- url = {https://www.itu.int/rec/T-REC-X.1702-201911-I/en},
- publisher = {International Telecommunications Union},
- month = {November},
- year = {2019}
-}
-
-@Misc{ In20,
- author = {Intel},
- title = {Deep Dive: Special Register Buffer Data Sampling},
- url = {https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling},
- howpublished = {Intel Developer Zone},
- publisher = {Intel},
- month = {June},
- year = {2020}
-}
-
-@Misc{ In20A,
- author = {Intel},
- title = {{SRBDS} Mitigation Impact on Intel Secure Key},
- url = {https://software.intel.com/security-software-guidance/insights/srbds-mitigation-impact-intel-secure-key},
- howpublished = {Intel Developer Zone},
- publisher = {Intel},
- month = {June},
- year = {2020}
-}
-
-@InProceedings{ JaNaRo:20,
- author = {Samuel Jaques and Michael Naehrig and Martin Roetteler and
- Fernando Virdia},
- title = {Implementing Grover Oracles for Quantum Key Search on
- {AES} and LowMC},
- booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual
- International Conference on the Theory and Applications of
- Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020,
- Proceedings, Part {II}},
- pages = {280--310},
- crossref = {_CaIs20},
- url = {https://arxiv.org/pdf/1910.01700.pdf},
- doi = {10.1007/978-3-030-45724-2\_10},
- year = {2020}
-}
-
-@Article{ KaScVe13,
- author = {Dusko Karaklajic and J{\"{o}}rn{-}Marc Schmidt and Ingrid
- Verbauwhede},
- title = {Hardware Designer's Guide to Fault Attacks},
- journal = {{IEEE} Trans. Very Large Scale Integr. Syst.},
- volume = {21},
- number = {12},
- pages = {2295--2306},
- doi = {10.1109/TVLSI.2012.2231707},
- publisher = {IEEE},
- year = {2013}
-}
-
-@Misc{ KiSc01,
- author = {Wolfgang Killmann and Werner Schindler},
- title = {A Proposal for: Functionality classes and evaluation
- methodology for true (physical) random number generators},
- howpublished = {AIS 31, Version 3.1, English Translation, BSI},
- url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_evaluation_methodology_for_true_RNG_e.html},
- publisher = {BSI},
- month = {September},
- year = {2001}
-}
-
-@Misc{ KiSc11,
- author = {Wolfgang Killmann and Werner Schindler},
- title = {A Proposal for: Functionality classes for random number
- generators},
- howpublished = {AIS 20 / AIS 31, Version 2.0, English Translation, BSI},
- url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_for_random_number_generators_e.html},
- publisher = {BSI},
- month = {September},
- year = {2011}
-}
-
-@Misc{ KoXiHu:21,
- author = {Nick Kossifidis and Joe Xie and Bill Huffman and Allen
- Baum and Greg Favor and Tariq Kurd and Fumio Arakawa},
- title = {{PMP} Enhancements for memory access and execution
- prevention on Machine mode},
- howpublished = {Version 0.9.1 -- {RISC}-{V} {TEE} Task Group},
- month = {May},
- year = {2021}
+@Misc{ AM17,
+ author = {{AMD}},
+ title = {{AMD} Random Number Generator},
+ howpublished = {AMD TechDocs},
+ publisher = {Advanced Micro Devices},
+ url = {https://www.amd.com/system/files/TechDocs/amd-random-number-generator.pdf},
+ month = {June},
+ year = {2017}
+}
+
+@Misc{ AR17,
+ author = {{ARM}},
+ title = {ARM TrustZone True Random Number Generator: Technical Reference Manual},
+ howpublished = {ARM 100976\_0000\_00\_en (rev. r0p0)},
+ publisher = {{ARM}},
+ url = {http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100976_0000_00_en},
+ month = {May},
+ year = {2017}
+}
+
+@Misc{ AR20,
+ author = {{ARM}},
+ title = {Arm Architecture Registers: Armv8, for Armv8-A
+ architecture profile},
+ howpublished = {ARM DDI 0595 (ID033020)},
+ publisher = {{ARM}},
+ url = {https://developer.arm.com/docs/ddi0595/g},
+ month = {April},
+ year = {2020}
+}
+
+@Book{ An20,
+ author = {Ross J. Anderson},
+ title = {Security engineering - a guide to building dependable
+ distributed systems {(3.} ed.)},
+ publisher = {Wiley},
+ isbn = {978-1-119-64278-7},
+ url = {https://www.cl.cam.ac.uk/~rja14/book.html},
+ month = {December},
+ year = {2020}
+}
+
+@Misc{ BS13,
+ author = {{BSI}},
+ title = {Evaluation of random number generators},
+ howpublished = {Version 0.10, BSI},
+ url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_AIS_31_Evaluation_of_random_number_generators_e.html},
+ publisher = {BSI},
+ month = {March},
+ year = {2013}
+}
+
+@Misc{ Ba20,
+ author = {Elaine Barker},
+ title = {Recommendation for Key Management: Part 1 -- General},
+ howpublished = {NIST Special Publication SP 0 Part 1, Revision 5},
+ doi = {10.6028/NIST.SP.800-57pt1r5},
+ publisher = {{NIST}},
+ month = {May},
+ year = {2020}
+}
+
+@Article{ Ba86,
+ author = {Per Bak},
+ title = {The Devil's Staircase},
+ journal = {Phys. Today},
+ volume = {39},
+ number = {12},
+ pages = {38--45},
+ doi = {10.1063/1.881047},
+ publisher = {{AIP}},
+ month = {December},
+ year = {1986}
+}
+
+@Misc{ BaBa19,
+ author = {Elaine Barker and William Barker},
+ title = {Recommendation for Key Management: Part 2 -- Best
+ Practices for Key Management Organizations},
+ howpublished = {NIST Special Publication SP 800-57 Part 2, Revision 1},
+ doi = {10.6028/NIST.SP.800-57pt2r1},
+ publisher = {{NIST}},
+ month = {May},
+ year = {2019}
+}
+
+@Misc{ BaDa15,
+ author = {Elaine Barker and Quynh Dang},
+ title = {Recommendation for Key Management, Part 3:
+ Application-Specific Key Management Guidance},
+ howpublished = {NIST Special Publication SP 800-57 Part 3, Revision 1},
+ doi = {10.6028/NIST.SP.800-57pt3r1},
+ publisher = {{NIST}},
+ month = {January},
+ year = {2015}
+}
+
+@InProceedings{ BaFoKa:12,
+ author = {Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and
+ Lorenzo Simionato and Graham Steel and Joe{-}Kai Tsay},
+ title = {Efficient Padding Oracle Attacks on Cryptographic
+ Hardware},
+ booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual
+ Cryptology Conference, Santa Barbara, CA, USA, August
+ 19-23, 2012. Proceedings},
+ pages = {608--625},
+ crossref = {_SaCa12},
+ doi = {10.1007/978-3-642-32009-5\_36},
+ year = {2012}
+}
+
+@Misc{ BaKe15,
+ author = {Elaine Barker and John Kelsey},
+ title = {Recommendation for Random Number Generation Using
+ Deterministic Random Bit Generators},
+ howpublished = {NIST Special Publication SP 800-90A Revision 1},
+ doi = {10.6028/NIST.SP.800-90Ar1},
+ month = {June},
+ year = {2015}
+}
+
+@Misc{ BaKeRo:21,
+ author = {Elaine Barker and John Kelsey and Allen Roginsky and
+ Meltem Sönmez Turan and Darryl Buller and Aaron Kaufer},
+ title = {Recommendation for Random Bit Generator ({RBG})
+ Constructions},
+ howpublished = {Draft NIST Special Publication SP 800-90C},
+ month = {March},
+ year = {2021}
+}
+
+@Article{ BaLuMi:11,
+ author = {Mathieu Baudet and David Lubicz and Julien Micolod and
+ Andr{\'{e}} Tassiaux},
+ title = {On the Security of Oscillator-Based Random Number
+ Generators},
+ journal = {J. Cryptology},
+ volume = {24},
+ number = {2},
+ pages = {398--425},
+ doi = {10.1007/s00145-010-9089-3},
+ year = {2011}
+}
+
+@Article{ BeRePa:14,
+ author = {Georg T. Becker and Francesco Regazzoni and Christof Paar
+ and Wayne P. Burleson},
+ title = {Stealthy dopant-level hardware Trojans: extended version},
+ journal = {J. Cryptographic Engineering},
+ volume = {4},
+ number = {1},
+ pages = {19--31},
+ publisher = {Springer},
+ doi = {10.1007/s13389-013-0068-0},
+ year = {2014}
+}
+
+@Article{ Bl86,
+ author = {Manuel Blum},
+ title = {Independent unbiased coin flips from a correlated biased
+ source -- A finite state Markov chain},
+ journal = {Combinatorica},
+ volume = {6},
+ number = {2},
+ pages = {97--108},
+ doi = {10.1007/BF02579167},
+ year = {1986}
+}
+
+@Article{ BlBlSh86,
+ author = {Lenore Blum and Manuel Blum and Mike Shub},
+ title = {A Simple Unpredictable Pseudo-Random Number Generator},
+ journal = {{SIAM} J. Comput.},
+ volume = {15},
+ number = {2},
+ pages = {364--383},
+ doi = {10.1137/0215025},
+ publisher = {{SIAM}},
+ year = {1986}
+}
+
+@InProceedings{ ChMaGa:16,
+ author = {Stephen Checkoway and Jacob Maskiewicz and Christina
+ Garman and Joshua Fried and Shaanan Cohney and Matthew
+ Green and Nadia Heninger and Ralf{-}Philipp Weinmann and
+ Eric Rescorla and Hovav Shacham},
+ title = {A Systematic Analysis of the Juniper Dual {EC} Incident},
+ booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on
+ Computer and Communications Security, Vienna, Austria,
+ October 24-28, 2016},
+ pages = {468--479},
+ crossref = {_WeKaKr:16},
+ doi = {10.1145/2976749.2978395},
+ year = {2016}
+}
+
+@Article{ ChMaGa:18,
+ author = {Stephen Checkoway and Jacob Maskiewicz and Christina
+ Garman and Joshua Fried and Shaanan Cohney and Matthew
+ Green and Nadia Heninger and Ralf{-}Philipp Weinmann and
+ Eric Rescorla and Hovav Shacham},
+ title = {Where did {I} leave my keys?: lessons from the Juniper
+ Dual {EC} incident},
+ journal = {Commun. {ACM}},
+ volume = {61},
+ number = {11},
+ pages = {148--155},
+ publisher = {{ACM}},
+ doi = {10.1145/3266291},
+ year = {2018}
+}
+
+@Misc{ Cr17,
+ author = {Common Criteria},
+ title = {Common Methodology for Information Technology Security
+ Evaluation: Evaluation methodology},
+ howpublished = {Specification: Version 3.1 Revision 5},
+ url = {https://commoncriteriaportal.org/cc/},
+ month = {April},
+ year = {2017}
+}
+
+@Misc{ Da02,
+ author = {Robert B. Davies},
+ title = {Exclusive OR (XOR) and hardware random number generators},
+ howpublished = {Author-hosted manuscript},
+ url = {http://www.robertnz.net/pdf/xor2.pdf},
+ month = {February},
+ year = {2002}
+}
+
+@Book{ DaRo58,
+ author = {Wilbur B. Davenport Jr. and William L. Root},
+ title = {An Introduction to the Theory of Random Signals and
+ Noise},
+ url = {https://ieeexplore.ieee.org/servlet/opac?bknumber=5265617},
+ pages = {401},
+ publisher = {McGraw-Hill},
+ year = {1958}
+}
+
+@Article{ El72,
+ author = {Peter Elias},
+ title = {The Efficient Construction of an Unbiased Random
+ Sequence},
+ journal = {Ann. Math. Statist.},
+ volume = {43},
+ number = {3},
+ pages = {865--870},
+ doi = {10.1214/aoms/1177692552},
+ publisher = {Institute of Mathematical Statistics},
+ year = {1972}
+}
+
+@InProceedings{ EvPo16,
+ author = {Dmitry Evtyushkin and Dmitry V. Ponomarev},
+ title = {Covert Channels through Random Number Generator:
+ Mechanisms, Capacity Estimation and Mitigations},
+ booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on
+ Computer and Communications Security, Vienna, Austria,
+ October 24-28, 2016},
+ pages = {843--857},
+ crossref = {_WeKaKr:16},
+ doi = {10.1145/2976749.2978374},
+ year = {2016}
+}
+
+@InProceedings{ Gr96,
+ author = {Lov K. Grover},
+ title = {A Fast Quantum Mechanical Algorithm for Database Search},
+ booktitle = {Proceedings of the Twenty-eighth Annual ACM Symposium on
+ Theory of Computing},
+ series = {STOC '96},
+ pages = {212--219},
+ url = {http://arxiv.org/pdf/quant-ph/9605043},
+ doi = {10.1145/237814.237866},
+ publisher = {{ACM}},
+ year = 1996
+}
+
+@InProceedings{ GrLaRo:16,
+ author = {Markus Grassl and Brandon Langenberg and Martin Roetteler
+ and Rainer Steinwandt},
+ title = {Applying Grover's Algorithm to {AES:} Quantum Resource
+ Estimates},
+ booktitle = {Post-Quantum Cryptography - 7th International Workshop,
+ PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016,
+ Proceedings},
+ pages = {29--43},
+ crossref = {_Ta16},
+ url = {https://arxiv.org/pdf/1512.04965.pdf},
+ doi = {10.1007/978-3-319-29360-8\_3},
+ year = {2016}
+}
+
+@Misc{ HaKoMa12,
+ author = {Mike Hamburg and Paul Kocher and Mark E. Marson},
+ title = {Analysis of Intel's Ivy Bridge Digital Random Number
+ Generator},
+ howpublished = {Technical Report, Cryptography Research (Prepared for
+ Intel)},
+ month = {March},
+ year = {2012}
+}
+
+@Article{ HaLe98,
+ author = {Ali Hajimiri and Thomas H. Lee},
+ title = {A general theory of phase noise in electrical
+ oscillators},
+ journal = {IEEE Journal of Solid-State Circuits},
+ volume = {33},
+ number = {2},
+ pages = {179--194},
+ publisher = {{IEEE}},
+ doi = {10.1109/4.658619},
+ year = {1998}
+}
+
+@Article{ HaLiLe99,
+ author = {Ali Hajimiri and Sotirios Limotyrakis and Thomas H. Lee},
+ title = {Jitter and phase noise in ring oscillators},
+ journal = { {IEEE} Journal of Solid-State Circuits},
+ volume = {34},
+ number = {6},
+ doi = {10.1109/4.766813},
+ url = {https://authors.library.caltech.edu/4916/1/HAJieeejssc99a.pdf},
+ pages = {790--804},
+ month = {June},
+ year = {1999}
+}
+
+@Article{ HuHe20,
+ author = {Darren Hurley-Smith and Julio C\'esar Hern\'andez-Castro},
+ title = {Quantum Leap and Crash: Searching and Finding Bias in
+ Quantum Random Number Generators},
+ journal = {ACM Transactions on Privacy and Security},
+ volume = {23},
+ number = {3},
+ pages = {1--25},
+ doi = {10.1145/3403643},
+ publisher = {{ACM}},
+ month = {June},
+ year = {2020}
+}
+
+@TechReport{ IS16,
+ author = {{ISO}},
+ type = {Standard},
+ title = {Information technology -- Security techniques -- Testing
+ methods for the mitigation of non-invasive attack classes
+ against cryptographic modules},
+ shorttitle = {{ISO}/{IEC} 17825:2016},
+ language = {en},
+ number = {ISO/IEC 17825:2016},
+ institution = {International Organization for Standardization},
+ year = {2016}
+}
+
+@Misc{ IT19,
+ author = {ITU},
+ title = {Quantum noise random number generator architecture},
+ howpublished = {Recommendation ITU-T X.1702},
+ url = {https://www.itu.int/rec/T-REC-X.1702-201911-I/en},
+ publisher = {International Telecommunications Union},
+ month = {November},
+ year = {2019}
+}
+
+@Misc{ In20,
+ author = {Intel},
+ title = {Deep Dive: Special Register Buffer Data Sampling},
+ url = {https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling},
+ howpublished = {Intel Developer Zone},
+ publisher = {Intel},
+ month = {June},
+ year = {2020}
+}
+
+@Misc{ In20A,
+ author = {Intel},
+ title = {{SRBDS} Mitigation Impact on Intel Secure Key},
+ url = {https://software.intel.com/security-software-guidance/insights/srbds-mitigation-impact-intel-secure-key},
+ howpublished = {Intel Developer Zone},
+ publisher = {Intel},
+ month = {June},
+ year = {2020}
+}
+
+@InProceedings{ JaNaRo:20,
+ author = {Samuel Jaques and Michael Naehrig and Martin Roetteler and
+ Fernando Virdia},
+ title = {Implementing Grover Oracles for Quantum Key Search on
+ {AES} and LowMC},
+ booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual
+ International Conference on the Theory and Applications of
+ Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020,
+ Proceedings, Part {II}},
+ pages = {280--310},
+ crossref = {_CaIs20},
+ url = {https://arxiv.org/pdf/1910.01700.pdf},
+ doi = {10.1007/978-3-030-45724-2\_10},
+ year = {2020}
+}
+
+@Article{ KaScVe13,
+ author = {Dusko Karaklajic and J{\"{o}}rn{-}Marc Schmidt and Ingrid
+ Verbauwhede},
+ title = {Hardware Designer's Guide to Fault Attacks},
+ journal = {{IEEE} Trans. Very Large Scale Integr. Syst.},
+ volume = {21},
+ number = {12},
+ pages = {2295--2306},
+ doi = {10.1109/TVLSI.2012.2231707},
+ publisher = {IEEE},
+ year = {2013}
+}
+
+@Misc{ KiSc01,
+ author = {Wolfgang Killmann and Werner Schindler},
+ title = {A Proposal for: Functionality classes and evaluation
+ methodology for true (physical) random number generators},
+ howpublished = {AIS 31, Version 3.1, English Translation, BSI},
+ url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_evaluation_methodology_for_true_RNG_e.html},
+ publisher = {BSI},
+ month = {September},
+ year = {2001}
+}
+
+@Misc{ KiSc11,
+ author = {Wolfgang Killmann and Werner Schindler},
+ title = {A Proposal for: Functionality classes for random number
+ generators},
+ howpublished = {AIS 20 / AIS 31, Version 2.0, English Translation, BSI},
+ url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_for_random_number_generators_e.html},
+ publisher = {BSI},
+ month = {September},
+ year = {2011}
+}
+
+@Misc{ KoXiHu:21,
+ author = {Nick Kossifidis and Joe Xie and Bill Huffman and Allen
+ Baum and Greg Favor and Tariq Kurd and Fumio Arakawa},
+ title = {{PMP} Enhancements for memory access and execution
+ prevention on Machine mode},
+ howpublished = {Version 0.9.1 -- {RISC}-{V} {TEE} Task Group},
+ month = {May},
+ year = {2021}
}
10.1007/978-3-540-71039-4\_21
-@InProceedings{ La08,
- author = {Patrick Lacharme},
- title = {Post-Processing Functions for a Biased Physical Random
- Number Generator},
- booktitle = {Fast Software Encryption, 15th International Workshop,
- {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008,
- Revised Selected Papers},
- pages = {334--342},
- crossref = {_Ny08},
- doi = {10.1007/978-3-540-71039-4\_21},
- year = {2008}
-}
-
-@Article{ LiBaBo:13,
- author = {John S. Liberty and Adrian Barrera and David W. Boerstler
- and Thomas B. Chadwick and Scott R. Cottier and H. Peter
- Hofstee and Julie A. Rosser and Marty L. Tsai},
- title = {True hardware random number generation implemented in the
- 32-nm {SOI} {POWER7+} processor},
- journal = {{IBM} J. Res. Dev.},
- volume = {57},
- number = {6},
- doi = {10.1147/JRD.2013.2279599},
- year = {2013}
-}
-
-@InProceedings{ MaMo09,
- author = {A. Theodore Markettos and Simon W. Moore},
- title = {The Frequency Injection Attack on Ring-Oscillator-Based
- True Random Number Generators},
- booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009,
- 11th International Workshop, Lausanne, Switzerland,
- September 6-9, 2009, Proceedings},
- pages = {317--331},
- crossref = {_ClGa09},
- doi = {10.1007/978-3-642-04138-9\_23},
- year = {2009}
-}
-
-@Misc{ Me18,
- author = {John P. Mechalas},
- title = {Intel Digital Random Number Generator (DRNG) Software
- Implementation Guide},
- howpublished = {Intel Technical Report, Version 2.1},
- url = {https://software.intel.com/content/www/us/en/develop/articles/intel-digital-random-number-generator-drng-software-implementation-guide.html},
- month = {October},
- year = {2018}
-}
-
-@InProceedings{ MoSuEi:20,
- author = {Daniel Moghimi and Berk Sunar and Thomas Eisenbarth and
- Nadia Heninger},
- title = {{TPM}-{FAIL}: {TPM} meets Timing and Lattice Attacks},
- booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)},
- url = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-tpm},
- pages = {To appear},
- publisher = {{USENIX} Association},
- month = {August},
- year = {2020}
-}
-
-@Misc{ Mu20,
- author = {Stephan M\"uller},
- title = {Documentation and Analysis of the Linux Random Number
- Generator, Version 3.6},
- howpublished = {Prepared for BSI by atsec information security GmbH},
- url = {https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/LinuxRNG/LinuxRNG_EN.pdf},
- month = {April},
- year = {2020}
-}
-
-@Misc{ NC20,
- author = {NCSC},
- title = {Quantum security technologies},
- howpublished = {White paper, Version 1.0. National Cyber Security Centre
- (UK).},
- url = {https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies},
- month = {March},
- year = {2020}
-}
-
-@Misc{ NI16,
- author = {{NIST}},
- title = {Submission Requirements and Evaluation Criteria for the
- Post-Quantum Cryptography Standardization Process},
- howpublished = {Official Call for Proposals, National Institute for
- Standards and Technology},
- url = {http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-final-dec-2016.pdf},
- month = {December},
- year = 2016
-}
-
-@Misc{ NI19,
- author = {{NIST}},
- title = {Security Requirements for Cryptographic Modules},
- howpublished = {Federal Information Processing Standards Publication FIPS
- 140-3},
+@InProceedings{ La08,
+ author = {Patrick Lacharme},
+ title = {Post-Processing Functions for a Biased Physical Random
+ Number Generator},
+ booktitle = {Fast Software Encryption, 15th International Workshop,
+ {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008,
+ Revised Selected Papers},
+ pages = {334--342},
+ crossref = {_Ny08},
+ doi = {10.1007/978-3-540-71039-4\_21},
+ year = {2008}
+}
+
+@Article{ LiBaBo:13,
+ author = {John S. Liberty and Adrian Barrera and David W. Boerstler
+ and Thomas B. Chadwick and Scott R. Cottier and H. Peter
+ Hofstee and Julie A. Rosser and Marty L. Tsai},
+ title = {True hardware random number generation implemented in the
+ 32-nm {SOI} {POWER7+} processor},
+ journal = {{IBM} J. Res. Dev.},
+ volume = {57},
+ number = {6},
+ doi = {10.1147/JRD.2013.2279599},
+ year = {2013}
+}
+
+@InProceedings{ MaMo09,
+ author = {A. Theodore Markettos and Simon W. Moore},
+ title = {The Frequency Injection Attack on Ring-Oscillator-Based
+ True Random Number Generators},
+ booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009,
+ 11th International Workshop, Lausanne, Switzerland,
+ September 6-9, 2009, Proceedings},
+ pages = {317--331},
+ crossref = {_ClGa09},
+ doi = {10.1007/978-3-642-04138-9\_23},
+ year = {2009}
+}
+
+@Misc{ Me18,
+ author = {John P. Mechalas},
+ title = {Intel Digital Random Number Generator (DRNG) Software
+ Implementation Guide},
+ howpublished = {Intel Technical Report, Version 2.1},
+ url = {https://software.intel.com/content/www/us/en/develop/articles/intel-digital-random-number-generator-drng-software-implementation-guide.html},
+ month = {October},
+ year = {2018}
+}
+
+@InProceedings{ MoSuEi:20,
+ author = {Daniel Moghimi and Berk Sunar and Thomas Eisenbarth and
+ Nadia Heninger},
+ title = {{TPM}-{FAIL}: {TPM} meets Timing and Lattice Attacks},
+ booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)},
+ url = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-tpm},
+ pages = {To appear},
+ publisher = {{USENIX} Association},
+ month = {August},
+ year = {2020}
+}
+
+@Misc{ Mu20,
+ author = {Stephan M\"uller},
+ title = {Documentation and Analysis of the Linux Random Number
+ Generator, Version 3.6},
+ howpublished = {Prepared for BSI by atsec information security GmbH},
+ url = {https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/LinuxRNG/LinuxRNG_EN.pdf},
+ month = {April},
+ year = {2020}
+}
+
+@Misc{ NC20,
+ author = {NCSC},
+ title = {Quantum security technologies},
+ howpublished = {White paper, Version 1.0. National Cyber Security Centre
+ (UK).},
+ url = {https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies},
+ month = {March},
+ year = {2020}
+}
+
+@Misc{ NI16,
+ author = {{NIST}},
+ title = {Submission Requirements and Evaluation Criteria for the
+ Post-Quantum Cryptography Standardization Process},
+ howpublished = {Official Call for Proposals, National Institute for
+ Standards and Technology},
+ url = {http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-final-dec-2016.pdf},
+ month = {December},
+ year = 2016
+}
+
+@Misc{ NI19,
+ author = {{NIST}},
+ title = {Security Requirements for Cryptographic Modules},
+ howpublished = {Federal Information Processing Standards Publication FIPS
+ 140-3},
url = {https://doi.org/10.6028/NIST.FIPS.140-3},
- month = {March},
- year = {2019}
-}
-
-@Misc{ NICC21,
- author = {{NIST} and {CCCS}},
- title = {Implementation Guidance for {FIPS} 140-3 and the
- Cryptographic Module Validation Program},
- howpublished = {CMVP},
- url = {https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf},
- month = {May},
- year = {2021}
-}
-
-@Misc{ NS15,
- author = {{NSA}/{CSS}},
- title = {Commercial National Security Algorithm Suite},
- url = {https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm},
- month = {August},
- year = 2015
-}
-
-@InCollection{ Ne51,
- title = {Various Techniques Used in Connection with Random Digits},
- author = {von Neumann, John},
- booktitle = {Monte Carlo Method},
- editor = {Householder, A.~S. and Forsythe, G.~E. and Germond,
- H.~H.},
- series = {National Bureau of Standards Applied Mathematics Series},
- volume = {12},
- chapter = {13},
- pages = {36--38},
- publisher = {US Government Printing Office},
- address = {Washington, DC},
- url = {https://mcnp.lanl.gov/pdf_files/nbs_vonneumann.pdf},
- year = {1951}
-}
-
-@Misc{ Ra20,
- author = {Rambus},
- title = {TRNG-IP-76 / EIP-76 Family of FIPS Approved True Random
- Generators},
- howpublished = {Commercial Crypto IP. Formerly (2017) available from
- Inside Secure.},
- url = {https://www.rambus.com/security/crypto-accelerator-hardware-cores/basic-crypto-blocks/trng-ip-76/},
- year = {2020}
-}
-
-@InProceedings{ RaMiRa:21,
- author = {Hany Ragab and Alyssa Milburn and Kaveh Razavi and Herbert
- Bos and Cristiano Giuffrida},
- title = {CrossTalk : Speculative Data Leaks Across Cores Are Real},
- booktitle = {IEEE Symposium on Security \& Privacy 2021},
- url = {https://download.vusec.net/papers/crosstalk_sp21.pdf},
- pages = {To appear},
- publisher = {IEEE},
- month = {May},
- year = {2021}
-}
-
-@Article{ Ri44,
- author = {Stephen O. Rice},
- title = {Mathematical analysis of random noise (Parts I-II)},
- journal = {The Bell System Technical Journal},
- volume = {23},
- number = {3},
- pages = {282--332},
- doi = {10.1002/j.1538-7305.1944.tb00874.x},
- month = {July},
- year = {1944}
-}
-
-@Article{ Ri45,
- author = {Stephen O. Rice},
- title = {Mathematical analysis of random noise (Parts III-IV))},
- journal = {The Bell System Technical Journal},
- volume = {24},
- number = {1},
- pages = {46--156},
- doi = {10.1002/j.1538-7305.1945.tb00453.x},
- month = {January},
- year = {1945}
-}
-
-@Misc{ RuSoNe:10,
- author = {Andrew Rukhin and Juan Soto and James Nechvatal and Miles
- Smid and Elaine Barker and Stefan Leigh and Mark Levenson
- and Mark Vangel and David Banks and Alan Heckert and
- JamesDray and San Vo},
- title = {A Statistical Test Suite for Random and Pseudorandom
- Number Generators for Cryptographic Applications},
- doi = {10.6028/NIST.SP.800-22r1a},
- month = {April},
- year = {2010}
-}
-
-@Misc{ Sa19,
- author = {Jim Salter},
- title = {How a months-old {AMD} microcode bug destroyed my
- weekend},
- howpublished = {Ars Technica},
- url = {https://arstechnica.com/gadgets/2019/10/how-a-months-old-amd-microcode-bug-destroyed-my-weekend/},
- month = {October},
- year = {2019}
-}
-
-@InProceedings{ Sa20,
- author = {Markku-Juhani O. Saarinen},
- title = {A Lightweight ISA Extension for {AES} and {SM4}},
- booktitle = {First International Workshop on Secure RISC-V Architecture
- Design Exploration (SECRISC-V'20)},
- url = {https://arxiv.org/abs/2002.07041},
- publisher = {IEEE},
- month = {August},
- year = {2020}
-}
-
-
-@InProceedings{ SaNeMa20,
- author = {Markku-Juhani O. Saarinen and G. Richard Newell and Ben
- Marshall},
- title = {Building a Modern {TRNG}: An Entropy Source Interface for
- {RISC}-{V}},
- booktitle = {4th Workshop on Attacks and Solutions in Hardware Security
- (ASHES’20), November 13, 2020, Virtual Event, USA.},
- doi = {10.1145/3411504.3421212},
- publisher = {ACM},
- pages = {93--102},
- month = {November},
- year = 2020
+ month = {March},
+ year = {2019}
+}
+
+@Misc{ NICC21,
+ author = {{NIST} and {CCCS}},
+ title = {Implementation Guidance for {FIPS} 140-3 and the
+ Cryptographic Module Validation Program},
+ howpublished = {CMVP},
+ url = {https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf},
+ month = {May},
+ year = {2021}
+}
+
+@Misc{ NS15,
+ author = {{NSA}/{CSS}},
+ title = {Commercial National Security Algorithm Suite},
+ url = {https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm},
+ month = {August},
+ year = 2015
+}
+
+@InCollection{ Ne51,
+ title = {Various Techniques Used in Connection with Random Digits},
+ author = {von Neumann, John},
+ booktitle = {Monte Carlo Method},
+ editor = {Householder, A.~S. and Forsythe, G.~E. and Germond,
+ H.~H.},
+ series = {National Bureau of Standards Applied Mathematics Series},
+ volume = {12},
+ chapter = {13},
+ pages = {36--38},
+ publisher = {US Government Printing Office},
+ address = {Washington, DC},
+ url = {https://mcnp.lanl.gov/pdf_files/nbs_vonneumann.pdf},
+ year = {1951}
+}
+
+@Misc{ Ra20,
+ author = {Rambus},
+ title = {TRNG-IP-76 / EIP-76 Family of FIPS Approved True Random
+ Generators},
+ howpublished = {Commercial Crypto IP. Formerly (2017) available from
+ Inside Secure.},
+ url = {https://www.rambus.com/security/crypto-accelerator-hardware-cores/basic-crypto-blocks/trng-ip-76/},
+ year = {2020}
+}
+
+@InProceedings{ RaMiRa:21,
+ author = {Hany Ragab and Alyssa Milburn and Kaveh Razavi and Herbert
+ Bos and Cristiano Giuffrida},
+ title = {CrossTalk : Speculative Data Leaks Across Cores Are Real},
+ booktitle = {IEEE Symposium on Security \& Privacy 2021},
+ url = {https://download.vusec.net/papers/crosstalk_sp21.pdf},
+ pages = {To appear},
+ publisher = {IEEE},
+ month = {May},
+ year = {2021}
+}
+
+@Article{ Ri44,
+ author = {Stephen O. Rice},
+ title = {Mathematical analysis of random noise (Parts I-II)},
+ journal = {The Bell System Technical Journal},
+ volume = {23},
+ number = {3},
+ pages = {282--332},
+ doi = {10.1002/j.1538-7305.1944.tb00874.x},
+ month = {July},
+ year = {1944}
+}
+
+@Article{ Ri45,
+ author = {Stephen O. Rice},
+ title = {Mathematical analysis of random noise (Parts III-IV))},
+ journal = {The Bell System Technical Journal},
+ volume = {24},
+ number = {1},
+ pages = {46--156},
+ doi = {10.1002/j.1538-7305.1945.tb00453.x},
+ month = {January},
+ year = {1945}
+}
+
+@Misc{ RuSoNe:10,
+ author = {Andrew Rukhin and Juan Soto and James Nechvatal and Miles
+ Smid and Elaine Barker and Stefan Leigh and Mark Levenson
+ and Mark Vangel and David Banks and Alan Heckert and
+ JamesDray and San Vo},
+ title = {A Statistical Test Suite for Random and Pseudorandom
+ Number Generators for Cryptographic Applications},
+ doi = {10.6028/NIST.SP.800-22r1a},
+ month = {April},
+ year = {2010}
+}
+
+@Misc{ Sa19,
+ author = {Jim Salter},
+ title = {How a months-old {AMD} microcode bug destroyed my
+ weekend},
+ howpublished = {Ars Technica},
+ url = {https://arstechnica.com/gadgets/2019/10/how-a-months-old-amd-microcode-bug-destroyed-my-weekend/},
+ month = {October},
+ year = {2019}
+}
+
+@InProceedings{ Sa20,
+ author = {Markku-Juhani O. Saarinen},
+ title = {A Lightweight ISA Extension for {AES} and {SM4}},
+ booktitle = {First International Workshop on Secure RISC-V Architecture
+ Design Exploration (SECRISC-V'20)},
+ url = {https://arxiv.org/abs/2002.07041},
+ publisher = {IEEE},
+ month = {August},
+ year = {2020}
+}
+
+
+@InProceedings{ SaNeMa20,
+ author = {Markku-Juhani O. Saarinen and G. Richard Newell and Ben
+ Marshall},
+ title = {Building a Modern {TRNG}: An Entropy Source Interface for
+ {RISC}-{V}},
+ booktitle = {4th Workshop on Attacks and Solutions in Hardware Security
+ (ASHES’20), November 13, 2020, Virtual Event, USA.},
+ doi = {10.1145/3411504.3421212},
+ publisher = {ACM},
+ pages = {93--102},
+ month = {November},
+ year = 2020
}
@Misc{ Sa21,
@@ -1572,212 +1572,212 @@ pages={109-136}
year = 2021
}
-@Misc{ SaNeMa21,
- author = {Markku-Juhani O. Saarinen and G. Richard Newell and Ben
- Marshall},
- title = {Development of The {RISC}-{V} Entropy Source Interface},
- howpublished = {{IACR} ePrint 2020/866},
- url = {https://eprint.iacr.org/2029/866},
- publisher = {Submitted For Publication},
- month = {June},
- year = 2021
-}
-
-@Misc{ Sc99,
- author = {Werner Schindler},
- title = {Functionality classes and evaluation methodology for
- deterministic random number generators},
- howpublished = {AIS 20, Version 2.0, English Translation, BSI},
- publisher = {BSI},
- url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_Functionality_Classes_Evaluation_Methodology_DRNG_e.html},
- month = {December},
- year = {1999}
-}
-
-@InProceedings{ Sh94,
- author = {Peter W. Shor},
- title = {Algorithms for quantum computation: Discrete logarithms
- and factoring},
- booktitle = {35th Annual Symposium on Foundations of Computer Science,
- Santa Fe, New Mexico, USA, 20-22 November 1994},
- pages = {124--134},
- publisher = {IEEE},
- doi = {10.1109/SFCS.1994.365700},
- url = {https://arxiv.org/abs/quant-ph/9508027},
- year = 1994
-}
-
-@Misc{ TG20,
- author = {{RISC-V} {Crypto} {TG}},
- title = {RISC-V Cryptography Extensions},
- url = {https://github.com/riscv/riscv-crypto},
- howpublished = {Editor's location -- to be integrated with main
- specifications},
- year = {2020}
+@Misc{ SaNeMa21,
+ author = {Markku-Juhani O. Saarinen and G. Richard Newell and Ben
+ Marshall},
+ title = {Development of The {RISC}-{V} Entropy Source Interface},
+ howpublished = {{IACR} ePrint 2020/866},
+ url = {https://eprint.iacr.org/2029/866},
+ publisher = {Submitted For Publication},
+ month = {June},
+ year = 2021
+}
+
+@Misc{ Sc99,
+ author = {Werner Schindler},
+ title = {Functionality classes and evaluation methodology for
+ deterministic random number generators},
+ howpublished = {AIS 20, Version 2.0, English Translation, BSI},
+ publisher = {BSI},
+ url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_Functionality_Classes_Evaluation_Methodology_DRNG_e.html},
+ month = {December},
+ year = {1999}
+}
+
+@InProceedings{ Sh94,
+ author = {Peter W. Shor},
+ title = {Algorithms for quantum computation: Discrete logarithms
+ and factoring},
+ booktitle = {35th Annual Symposium on Foundations of Computer Science,
+ Santa Fe, New Mexico, USA, 20-22 November 1994},
+ pages = {124--134},
+ publisher = {IEEE},
+ doi = {10.1109/SFCS.1994.365700},
+ url = {https://arxiv.org/abs/quant-ph/9508027},
+ year = 1994
+}
+
+@Misc{ TG20,
+ author = {{RISC-V} {Crypto} {TG}},
+ title = {RISC-V Cryptography Extensions},
+ url = {https://github.com/riscv/riscv-crypto},
+ howpublished = {Editor's location -- to be integrated with main
+ specifications},
+ year = {2020}
}
@Misc{TuBaKe:18,
- author = {Meltem S\"onmez Turan and Elaine Barker and John Kelsey and
- Kerry A. McKay and Mary L. Baish and Mike Boyle},
- title = {Recommendation for the Entropy Sources Used for Random Bit
- Generation},
- howpublished = {NIST Special Publication SP 800-90B},
- doi = {10.6028/NIST.SP.800-90B},
- month = {January},
- year = {2018}
-}
-
-@InProceedings{ VaDr10,
- author = {Michal Varchola and Milos Drutarovsk{\'{y}}},
- title = {New High Entropy Element for {FPGA} Based True Random
- Number Generators},
- booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010,
- 12th International Workshop, Santa Barbara, CA, USA, August
- 17-20, 2010. Proceedings},
- pages = {351--365},
- crossref = {_MaSt10},
- doi = {10.1007/978-3-642-15031-9\_24},
- year = {2010}
-}
-
-@InProceedings{ VaFiAu:10,
- author = {Boyan Valtchanov and Viktor Fischer and Alain Aubert and
- Florent Bernard},
- title = {Characterization of randomness sources in ring
- oscillator-based true random number generators in FPGAs},
- booktitle = {13th {IEEE} International Symposium on Design and
- Diagnostics of Electronic Circuits and Systems, {DDECS}
- 2010, Vienna, Austria, April 14-16, 2010},
- pages = {48--53},
- crossref = {_GrKoSt:10},
- doi = {10.1109/DDECS.2010.5491819},
- year = {2010}
-}
-
-@Proceedings{ _CaIs20,
- editor = {Anne Canteaut and Yuval Ishai},
- title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual
- International Conference on the Theory and Applications of
- Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020,
- Proceedings, Part {II}},
- series = {Lecture Notes in Computer Science},
- volume = {12106},
- publisher = {Springer},
- doi = {10.1007/978-3-030-45724-2},
- isbn = {978-3-030-45723-5},
- year = {2020}
-}
-
-@Proceedings{ _ClGa09,
- editor = {Christophe Clavier and Kris Gaj},
- title = {Cryptographic Hardware and Embedded Systems - {CHES} 2009,
- 11th International Workshop, Lausanne, Switzerland,
- September 6-9, 2009, Proceedings},
- series = {Lecture Notes in Computer Science},
- volume = {5747},
- publisher = {Springer},
- doi = {10.1007/978-3-642-04138-9},
- isbn = {978-3-642-04137-2},
- year = {2009}
-}
-
-@Proceedings{ _GrKoSt:10,
- editor = {Elena Gramatov{\'{a}} and Zdenek Kot{\'{a}}sek and Andreas
- Steininger and Heinrich Theodor Vierhaus and Horst
- Zimmermann},
- title = {13th {IEEE} International Symposium on Design and
- Diagnostics of Electronic Circuits and Systems, {DDECS}
- 2010, Vienna, Austria, April 14-16, 2010},
- publisher = {{IEEE} Computer Society},
- url = {https://ieeexplore.ieee.org/xpl/conhome/5484099/proceeding},
- isbn = {978-1-4244-6612-2},
- year = {2010}
-}
-
-@Proceedings{ _MaSt10,
- editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert},
- title = {Cryptographic Hardware and Embedded Systems, {CHES} 2010,
- 12th International Workshop, Santa Barbara, CA, USA, August
- 17-20, 2010. Proceedings},
- series = {Lecture Notes in Computer Science},
- volume = {6225},
- publisher = {Springer},
- doi = {10.1007/978-3-642-15031-9},
- isbn = {978-3-642-15030-2},
- year = {2010}
-}
-
-@Proceedings{ _Ny08,
- editor = {Kaisa Nyberg},
- title = {Fast Software Encryption, 15th International Workshop,
- {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008,
- Revised Selected Papers},
- series = {Lecture Notes in Computer Science},
- volume = {5086},
- publisher = {Springer},
- doi = {10.1007/978-3-540-71039-4},
- isbn = {978-3-540-71038-7},
- year = {2008}
-}
-
-@Proceedings{ _SaCa12,
- editor = {Reihaneh Safavi{-}Naini and Ran Canetti},
- title = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual
- Cryptology Conference, Santa Barbara, CA, USA, August
- 19-23, 2012. Proceedings},
- series = {Lecture Notes in Computer Science},
- volume = {7417},
- publisher = {Springer},
- doi = {10.1007/978-3-642-32009-5},
- isbn = {978-3-642-32008-8},
- year = {2012}
-}
-
-@Proceedings{ _Ta16,
- editor = {Tsuyoshi Takagi},
- title = {Post-Quantum Cryptography - 7th International Workshop,
- PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016,
- Proceedings},
- series = {Lecture Notes in Computer Science},
- volume = {9606},
- publisher = {Springer},
- doi = {10.1007/978-3-319-29360-8},
- isbn = {978-3-319-29359-2},
- year = {2016}
-}
-
-@Book{ _WaAs19,
- editor = {Andrew Waterman and Krste Asanovi\'c},
- title = {The {RISC}-{V} Instruction Set Manual, Volume I:
- User-Level {ISA}},
- note = {Document Version 20191213},
- publisher = {RISC-V Foundation},
- url = {https://riscv.org/specifications/},
- month = {December},
- year = 2019
-}
-
-@Book{ _WaAs19A,
- editor = {Andrew Waterman and Krste Asanovi\'c},
- title = {The {RISC}-{V} Instruction Set Manual, Volume II:
- Privileged Architecture},
- note = {Document Version 20190608-Priv-MSU-Ratified},
- publisher = {RISC-V Foundation},
- url = {https://riscv.org/specifications/},
- month = {June},
- year = 2019
-}
-
-@Proceedings{ _WeKaKr:16,
- editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher
- Kruegel and Andrew C. Myers and Shai Halevi},
- title = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on
- Computer and Communications Security, Vienna, Austria,
- October 24-28, 2016},
- publisher = {{ACM}},
- url = {http://dl.acm.org/citation.cfm?id=2976749},
- isbn = {978-1-4503-4139-4},
- year = {2016}
+ author = {Meltem S\"onmez Turan and Elaine Barker and John Kelsey and
+ Kerry A. McKay and Mary L. Baish and Mike Boyle},
+ title = {Recommendation for the Entropy Sources Used for Random Bit
+ Generation},
+ howpublished = {NIST Special Publication SP 800-90B},
+ doi = {10.6028/NIST.SP.800-90B},
+ month = {January},
+ year = {2018}
+}
+
+@InProceedings{ VaDr10,
+ author = {Michal Varchola and Milos Drutarovsk{\'{y}}},
+ title = {New High Entropy Element for {FPGA} Based True Random
+ Number Generators},
+ booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010,
+ 12th International Workshop, Santa Barbara, CA, USA, August
+ 17-20, 2010. Proceedings},
+ pages = {351--365},
+ crossref = {_MaSt10},
+ doi = {10.1007/978-3-642-15031-9\_24},
+ year = {2010}
+}
+
+@InProceedings{ VaFiAu:10,
+ author = {Boyan Valtchanov and Viktor Fischer and Alain Aubert and
+ Florent Bernard},
+ title = {Characterization of randomness sources in ring
+ oscillator-based true random number generators in FPGAs},
+ booktitle = {13th {IEEE} International Symposium on Design and
+ Diagnostics of Electronic Circuits and Systems, {DDECS}
+ 2010, Vienna, Austria, April 14-16, 2010},
+ pages = {48--53},
+ crossref = {_GrKoSt:10},
+ doi = {10.1109/DDECS.2010.5491819},
+ year = {2010}
+}
+
+@Proceedings{ _CaIs20,
+ editor = {Anne Canteaut and Yuval Ishai},
+ title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual
+ International Conference on the Theory and Applications of
+ Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020,
+ Proceedings, Part {II}},
+ series = {Lecture Notes in Computer Science},
+ volume = {12106},
+ publisher = {Springer},
+ doi = {10.1007/978-3-030-45724-2},
+ isbn = {978-3-030-45723-5},
+ year = {2020}
+}
+
+@Proceedings{ _ClGa09,
+ editor = {Christophe Clavier and Kris Gaj},
+ title = {Cryptographic Hardware and Embedded Systems - {CHES} 2009,
+ 11th International Workshop, Lausanne, Switzerland,
+ September 6-9, 2009, Proceedings},
+ series = {Lecture Notes in Computer Science},
+ volume = {5747},
+ publisher = {Springer},
+ doi = {10.1007/978-3-642-04138-9},
+ isbn = {978-3-642-04137-2},
+ year = {2009}
+}
+
+@Proceedings{ _GrKoSt:10,
+ editor = {Elena Gramatov{\'{a}} and Zdenek Kot{\'{a}}sek and Andreas
+ Steininger and Heinrich Theodor Vierhaus and Horst
+ Zimmermann},
+ title = {13th {IEEE} International Symposium on Design and
+ Diagnostics of Electronic Circuits and Systems, {DDECS}
+ 2010, Vienna, Austria, April 14-16, 2010},
+ publisher = {{IEEE} Computer Society},
+ url = {https://ieeexplore.ieee.org/xpl/conhome/5484099/proceeding},
+ isbn = {978-1-4244-6612-2},
+ year = {2010}
+}
+
+@Proceedings{ _MaSt10,
+ editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert},
+ title = {Cryptographic Hardware and Embedded Systems, {CHES} 2010,
+ 12th International Workshop, Santa Barbara, CA, USA, August
+ 17-20, 2010. Proceedings},
+ series = {Lecture Notes in Computer Science},
+ volume = {6225},
+ publisher = {Springer},
+ doi = {10.1007/978-3-642-15031-9},
+ isbn = {978-3-642-15030-2},
+ year = {2010}
+}
+
+@Proceedings{ _Ny08,
+ editor = {Kaisa Nyberg},
+ title = {Fast Software Encryption, 15th International Workshop,
+ {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008,
+ Revised Selected Papers},
+ series = {Lecture Notes in Computer Science},
+ volume = {5086},
+ publisher = {Springer},
+ doi = {10.1007/978-3-540-71039-4},
+ isbn = {978-3-540-71038-7},
+ year = {2008}
+}
+
+@Proceedings{ _SaCa12,
+ editor = {Reihaneh Safavi{-}Naini and Ran Canetti},
+ title = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual
+ Cryptology Conference, Santa Barbara, CA, USA, August
+ 19-23, 2012. Proceedings},
+ series = {Lecture Notes in Computer Science},
+ volume = {7417},
+ publisher = {Springer},
+ doi = {10.1007/978-3-642-32009-5},
+ isbn = {978-3-642-32008-8},
+ year = {2012}
+}
+
+@Proceedings{ _Ta16,
+ editor = {Tsuyoshi Takagi},
+ title = {Post-Quantum Cryptography - 7th International Workshop,
+ PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016,
+ Proceedings},
+ series = {Lecture Notes in Computer Science},
+ volume = {9606},
+ publisher = {Springer},
+ doi = {10.1007/978-3-319-29360-8},
+ isbn = {978-3-319-29359-2},
+ year = {2016}
+}
+
+@Book{ _WaAs19,
+ editor = {Andrew Waterman and Krste Asanovi\'c},
+ title = {The {RISC}-{V} Instruction Set Manual, Volume I:
+ User-Level {ISA}},
+ note = {Document Version 20191213},
+ publisher = {RISC-V Foundation},
+ url = {https://riscv.org/specifications/},
+ month = {December},
+ year = 2019
+}
+
+@Book{ _WaAs19A,
+ editor = {Andrew Waterman and Krste Asanovi\'c},
+ title = {The {RISC}-{V} Instruction Set Manual, Volume II:
+ Privileged Architecture},
+ note = {Document Version 20190608-Priv-MSU-Ratified},
+ publisher = {RISC-V Foundation},
+ url = {https://riscv.org/specifications/},
+ month = {June},
+ year = 2019
+}
+
+@Proceedings{ _WeKaKr:16,
+ editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher
+ Kruegel and Andrew C. Myers and Shai Halevi},
+ title = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on
+ Computer and Communications Security, Vienna, Austria,
+ October 24-28, 2016},
+ publisher = {{ACM}},
+ url = {http://dl.acm.org/citation.cfm?id=2976749},
+ isbn = {978-1-4503-4139-4},
+ year = {2016}
}
@electronic{DEBUG_SPEC,
title = {The RISC-V Debug Specification},
@@ -1785,3 +1785,20 @@ pages={109-136}
year = {}
}
~
+@article{HWASAN,
+ author = {Kostya Serebryany and
+ Evgenii Stepanov and
+ Aleksey Shlyapnikov and
+ Vlad Tsyrklevich and
+ Dmitry Vyukov},
+ title = {Memory Tagging and how it improves {C/C++} memory safety},
+ journal = {CoRR},
+ volume = {abs/1802.09517},
+ year = {2018},
+ url = {http://arxiv.org/abs/1802.09517},
+ eprinttype = {arXiv},
+ eprint = {1802.09517},
+ timestamp = {Mon, 13 Aug 2018 16:46:42 +0200},
+ biburl = {https://dblp.org/rec/journals/corr/abs-1802-09517.bib},
+ bibsource = {dblp computer science bibliography, https://dblp.org}
+}