diff options
Diffstat (limited to 'src/resources/riscv-spec.bib')
-rw-r--r-- | src/resources/riscv-spec.bib | 1935 |
1 files changed, 976 insertions, 959 deletions
diff --git a/src/resources/riscv-spec.bib b/src/resources/riscv-spec.bib index 16e6b38..d5b77d3 100644 --- a/src/resources/riscv-spec.bib +++ b/src/resources/riscv-spec.bib @@ -34,7 +34,7 @@ pages = {138--152}, publisher = {Computer Science Press, Inc.}, address = {New York, NY, USA}, -} +} @inproceedings{Ungar:1984, author = {David Ungar and Ricki Blau and Peter Foley and Dain Samples @@ -44,7 +44,7 @@ address = {Ann Arbor, MI}, year = {1984}, pages = {188--197} -} +} @Article{spur-jsscc1989, author = {David D. Lee and Shing I. Kong and Mark D. Hill and @@ -140,52 +140,52 @@ month = {December}, year = 2012} -@ARTICLE{tremblay-vis-ieeemicro1996, -author={Tremblay, M. and O'Connor, J.M. and Narayanan, V. and Liang He}, -journal={IEEE Micro}, -title={{VIS} speeds new media processing}, -year={1996}, -month=AUG, -volume={16}, -number={4}, -pages={10 -20}, -keywords={3D graphics environments;RISC-style instructions;UltraSparc;VIS;Visual Instruction Set;media processing;media-processing algorithms;computer graphics;instruction sets;reduced instruction set computing;}, +@ARTICLE{tremblay-vis-ieeemicro1996, +author={Tremblay, M. and O'Connor, J.M. and Narayanan, V. and Liang He}, +journal={IEEE Micro}, +title={{VIS} speeds new media processing}, +year={1996}, +month=AUG, +volume={16}, +number={4}, +pages={10 -20}, +keywords={3D graphics environments;RISC-style instructions;UltraSparc;VIS;Visual Instruction Set;media processing;media-processing algorithms;computer graphics;instruction sets;reduced instruction set computing;}, ISSN={0272-1732},} -@ARTICLE{lee-max-ieeemicro1996, -author={Lee, R.B.}, -journal={IEEE Micro}, -title={Subword parallelism with {MAX-2}}, -year={1996}, -month=AUG, -volume={16}, -number={4}, -pages={51 -59}, -keywords={MAX-2;instruction extensions;media processing;parallel computation;subword parallelism;word-oriented general-purpose processor;instruction sets;multimedia computing;parallel processing;}, +@ARTICLE{lee-max-ieeemicro1996, +author={Lee, R.B.}, +journal={IEEE Micro}, +title={Subword parallelism with {MAX-2}}, +year={1996}, +month=AUG, +volume={16}, +number={4}, +pages={51 -59}, +keywords={MAX-2;instruction extensions;media processing;parallel computation;subword parallelism;word-oriented general-purpose processor;instruction sets;multimedia computing;parallel processing;}, ISSN={0272-1732},} -@ARTICLE{peleg-mmx-ieeemicro1996, -author={Peleg, A. and Weiser, U.}, -journal={IEEE Micro}, -title={{MMX} technology extension to the {Intel} architecture}, -year={1996}, -month=AUG, -volume={16}, -number={4}, -pages={42 -50}, +@ARTICLE{peleg-mmx-ieeemicro1996, +author={Peleg, A. and Weiser, U.}, +journal={IEEE Micro}, +title={{MMX} technology extension to the {Intel} architecture}, +year={1996}, +month=AUG, +volume={16}, +number={4}, +pages={42 -50}, keywords={Intel architecture;MMX;SIMD;communications;compatibility;multimedia;operating systems;microprocessor chips;parallel architectures;}, ISSN={0272-1732},} -@ARTICLE{raman-sse-ieeemicro2000, -author={Raman, S.K. and Pentkovski, V. and Keshava, J.}, -journal={IEEE Micro}, -title={Implementing streaming {SIMD} extensions on the {Pentium}-{III} processor }, -year={2000}, +@ARTICLE{raman-sse-ieeemicro2000, +author={Raman, S.K. and Pentkovski, V. and Keshava, J.}, +journal={IEEE Micro}, +title={Implementing streaming {SIMD} extensions on the {Pentium}-{III} processor }, +year={2000}, month=JUL/AUG, -volume={20}, -number={4}, -pages={47 -57}, -keywords={Internet;Pentium III developers;demanding multimedia;die size constraints;streaming SIMD extensions;instruction sets;microprocessor chips;}, +volume={20}, +number={4}, +pages={47 -57}, +keywords={Internet;Pentium III developers;demanding multimedia;die size constraints;streaming SIMD extensions;instruction sets;microprocessor chips;}, ISSN={0272-1732},} @misc{lomont-avx-irm2011, @@ -195,28 +195,28 @@ howpublished = {Intel White Paper}, year = {2011}, } -@ARTICLE{goodacre-armisa-computer2005, -author={Goodacre, J. and Sloss, A.N.}, -journal={Computer}, -title={Parallelism and the {ARM} instruction set architecture}, -year={2005}, +@ARTICLE{goodacre-armisa-computer2005, +author={Goodacre, J. and Sloss, A.N.}, +journal={Computer}, +title={Parallelism and the {ARM} instruction set architecture}, +year={2005}, month=JULY, -volume={38}, -number={7}, -pages={ 42 - 50}, -keywords={ ARM RISC processor; ARM chip design; ARM instruction set architecture; digital signal processor-like operations; exception handling; multiprocessing; reduced-instruction-set computing; subword parallelism; thread-level parallelism; variable execution time; instruction sets; microprocessor chips; parallel architectures; parallel programming; reduced instruction set computing;}, +volume={38}, +number={7}, +pages={ 42 - 50}, +keywords={ ARM RISC processor; ARM chip design; ARM instruction set architecture; digital signal processor-like operations; exception handling; multiprocessing; reduced-instruction-set computing; subword parallelism; thread-level parallelism; variable execution time; instruction sets; microprocessor chips; parallel architectures; parallel programming; reduced instruction set computing;}, ISSN={0018-9162},} -@ARTICLE{diefendorff-altivec-ieeemicro2000, -author={Diefendorff, K. and Dubey, P.K. and Hochsprung, R. and Scale, H.}, +@ARTICLE{diefendorff-altivec-ieeemicro2000, +author={Diefendorff, K. and Dubey, P.K. and Hochsprung, R. and Scale, H.}, journal={IEEE Micro}, -title={{AltiVec} extension to {PowerPC} accelerates media processing}, -year={2000}, +title={{AltiVec} extension to {PowerPC} accelerates media processing}, +year={2000}, month=MAR/APR, -volume={20}, -number={2}, -pages={85 -95}, -keywords={2D image processing;3D graphics;AltiVec extension;Apple G4;Hewlett-Packard added MAX;MDMX;MIPS architecture;MMX;Motorola's MPC 7400;PA-RISC architecture;PowerPC;PowerPC's AltiVec;SSE;Silicon Graphics;Sun enhanced Sparc;alias KNI;handwriting recognition;media mining;media processing;multimedia technologies;narrow/broadband signal processing;personal computing;digital signal processing chips;handwriting recognition;multimedia systems;parallel architectures;}, +volume={20}, +number={2}, +pages={85 -95}, +keywords={2D image processing;3D graphics;AltiVec extension;Apple G4;Hewlett-Packard added MAX;MDMX;MIPS architecture;MMX;Motorola's MPC 7400;PA-RISC architecture;PowerPC;PowerPC's AltiVec;SSE;Silicon Graphics;Sun enhanced Sparc;alias KNI;handwriting recognition;media mining;media processing;multimedia technologies;narrow/broadband signal processing;personal computing;digital signal processing chips;handwriting recognition;multimedia systems;parallel architectures;}, ISSN={0272-1732},} @misc{gwennap-mdmx-mpr1996, @@ -237,7 +237,7 @@ year = {1996}, pages = {12--25}, publisher = {IEEE Computer Society Press}, address = {Los Alamitos, CA, USA}, -} +} @InProceedings{tx2, author = {John M. Frankovich and H. Philip Peterson}, @@ -263,7 +263,7 @@ year = {1996}, series = {PACT '98}, year = {1998}, address = {Washington, DC, USA}, -} +} @inproceedings{Kim-micro2005, author = {Kim, Hyesoon and Mutlu, Onur and Stark, Jared and Patt, Yale N.}, @@ -273,16 +273,16 @@ year = {1996}, year = {2005}, location = {Barcelona, Spain}, pages = {43--54}, -} +} @INPROCEEDINGS{Gharachorloo90memoryconsistency, author = {Kourosh Gharachorloo and Daniel Lenoski and James Laudon and Phillip Gibbons and Anoop Gupta and John - Hennessy}, + Hennessy}, title = {Memory Consistency and Event Ordering in Scalable - Shared-Memory Multiprocessors}, + Shared-Memory Multiprocessors}, booktitle = {In Proceedings of the 17th Annual International - Symposium on Computer Architecture}, + Symposium on Computer Architecture}, year = {1990}, pages = {15--26} } @@ -297,7 +297,7 @@ year = {1996}, location = {Austin, Texas}, pages = {294--305}, publisher = {IEEE Computer Society}, -} +} @Misc{sparcieee1994, title = {{IEEE} Standard for a 32-bit microprocessor}, @@ -342,16 +342,16 @@ year = {1996}, numpages = {9}, publisher = {ACM}, address = {New York, NY, USA}, -} +} @ARTICLE{goldbergvm, -author={Goldberg, Robert P.}, -journal={Computer}, -title={Survey of virtual machine research}, -year={1974}, -month={June}, -volume={7}, -number={6}, +author={Goldberg, Robert P.}, +journal={Computer}, +title={Survey of virtual machine research}, +year={1974}, +month={June}, +volume={7}, +number={6}, pages={34-45} } @@ -381,7 +381,7 @@ pages={34-45} acmid = {844138}, publisher = {ACM}, address = {New York, NY, USA}, -} +} @Book{stretch, author = "Werner Buchholz", @@ -407,7 +407,7 @@ pages={34-45} year = {1965}, location = {San Francisco, California}, pages = {33--40} -} +} @InProceedings{jtseng:sbbci, author = {J. Tseng and K. Asanovi\'c}, @@ -480,22 +480,22 @@ pages={34-45} } -@inproceedings{lithe-pan-hotpar09, +@inproceedings{lithe-pan-hotpar09, author = {Heidi Pan and Benjamin Hindman and Krste Asanovi\'c}, title = {{Lithe}: Enabling Efficient Composition of Parallel Libraries}, booktitle = {Proceedings of the 1st USENIX Workshop on Hot Topics in Parallelism (HotPar~'09)}, month = {March}, year = {2009}, -address = {Berkeley, CA}} +address = {Berkeley, CA}} -@inproceedings{lithe-pan-pldi10, +@inproceedings{lithe-pan-pldi10, author = {Heidi Pan and Benjamin Hindman and Krste Asanovi\'c}, title = {Composing Parallel Software Efficiently with {Lithe}}, booktitle = {31st Conference on Programming Language Design and Implementation}, month = {June}, year = {2010}, -address = {Toronto, Canada}} +address = {Toronto, Canada}} @article{roux:hal-01091186, TITLE = {{Innocuous Double Rounding of Basic Arithmetic Operations}}, @@ -606,7 +606,7 @@ address = {Toronto, Canada}} } @misc{nist:fips:197, - author = {{NIST}}, + author = {{NIST}}, title = {{Advanced} {Encryption} {Standard} ({AES})}, howpublished = {Federal Information Processing Standards Publication FIPS 197}, @@ -650,7 +650,7 @@ address = {Toronto, Canada}} @Misc{gbt:sm4, title = {{GB}/{T} 32907-2016: {SM4} Block Cipher Algorithm}, - howpublished = {Also {GM}/{T} 0002-2012. Standardization Administration of China}, + howpublished = {Also {GM}/{T} 0002-2012. Standardization Administration of China}, url = {http://www.gmbz.org.cn/upload/2018-04-04/1522788048733065051.pdf}, month = {August}, year = {2016} @@ -659,7 +659,7 @@ address = {Toronto, Canada}} @Misc{iso:sm3, author = {ISO/IEC}, title = {IT Security techniques -- Hash-functions -- Part 3: - Dedicated hash-functions}, + Dedicated hash-functions}, howpublished = {{ISO}/{IEC} Standard 10118-3:2018}, year = {2018} } @@ -750,7 +750,7 @@ pages={109-136} % -% Block Cipher Specifiations +% Block Cipher Specifications % ----------------------------------------------------------------- @inproceedings{block:prince, @@ -884,683 +884,683 @@ pages={109-136} % ----------------------------------------------------------------- -@Misc{ AM17, - author = {{AMD}}, - title = {{AMD} Random Number Generator}, - howpublished = {AMD TechDocs}, - publisher = {Advanced Micro Devices}, - url = {https://www.amd.com/system/files/TechDocs/amd-random-number-generator.pdf}, - month = {June}, - year = {2017} -} - -@Misc{ AR17, - author = {{ARM}}, - title = {ARM TrustZone True Random Number Generator: Technical Reference Manual}, - howpublished = {ARM 100976\_0000\_00\_en (rev. r0p0)}, - publisher = {{ARM}}, - url = {http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100976_0000_00_en}, - month = {May}, - year = {2017} -} - -@Misc{ AR20, - author = {{ARM}}, - title = {Arm Architecture Registers: Armv8, for Armv8-A - architecture profile}, - howpublished = {ARM DDI 0595 (ID033020)}, - publisher = {{ARM}}, - url = {https://developer.arm.com/docs/ddi0595/g}, - month = {April}, - year = {2020} -} - -@Book{ An20, - author = {Ross J. Anderson}, - title = {Security engineering - a guide to building dependable - distributed systems {(3.} ed.)}, - publisher = {Wiley}, - isbn = {978-1-119-64278-7}, - url = {https://www.cl.cam.ac.uk/~rja14/book.html}, - month = {December}, - year = {2020} -} - -@Misc{ BS13, - author = {{BSI}}, - title = {Evaluation of random number generators}, - howpublished = {Version 0.10, BSI}, - url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_AIS_31_Evaluation_of_random_number_generators_e.html}, - publisher = {BSI}, - month = {March}, - year = {2013} -} - -@Misc{ Ba20, - author = {Elaine Barker}, - title = {Recommendation for Key Management: Part 1 -- General}, - howpublished = {NIST Special Publication SP 0 Part 1, Revision 5}, - doi = {10.6028/NIST.SP.800-57pt1r5}, - publisher = {{NIST}}, - month = {May}, - year = {2020} -} - -@Article{ Ba86, - author = {Per Bak}, - title = {The Devil's Staircase}, - journal = {Phys. Today}, - volume = {39}, - number = {12}, - pages = {38--45}, - doi = {10.1063/1.881047}, - publisher = {{AIP}}, - month = {December}, - year = {1986} -} - -@Misc{ BaBa19, - author = {Elaine Barker and William Barker}, - title = {Recommendation for Key Management: Part 2 -- Best - Practices for Key Management Organizations}, - howpublished = {NIST Special Publication SP 800-57 Part 2, Revision 1}, - doi = {10.6028/NIST.SP.800-57pt2r1}, - publisher = {{NIST}}, - month = {May}, - year = {2019} -} - -@Misc{ BaDa15, - author = {Elaine Barker and Quynh Dang}, - title = {Recommendation for Key Management, Part 3: - Application-Specific Key Management Guidance}, - howpublished = {NIST Special Publication SP 800-57 Part 3, Revision 1}, - doi = {10.6028/NIST.SP.800-57pt3r1}, - publisher = {{NIST}}, - month = {January}, - year = {2015} -} - -@InProceedings{ BaFoKa:12, - author = {Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and - Lorenzo Simionato and Graham Steel and Joe{-}Kai Tsay}, - title = {Efficient Padding Oracle Attacks on Cryptographic - Hardware}, - booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual - Cryptology Conference, Santa Barbara, CA, USA, August - 19-23, 2012. Proceedings}, - pages = {608--625}, - crossref = {_SaCa12}, - doi = {10.1007/978-3-642-32009-5\_36}, - year = {2012} -} - -@Misc{ BaKe15, - author = {Elaine Barker and John Kelsey}, - title = {Recommendation for Random Number Generation Using - Deterministic Random Bit Generators}, - howpublished = {NIST Special Publication SP 800-90A Revision 1}, - doi = {10.6028/NIST.SP.800-90Ar1}, - month = {June}, - year = {2015} -} - -@Misc{ BaKeRo:21, - author = {Elaine Barker and John Kelsey and Allen Roginsky and - Meltem Sönmez Turan and Darryl Buller and Aaron Kaufer}, - title = {Recommendation for Random Bit Generator ({RBG}) - Constructions}, - howpublished = {Draft NIST Special Publication SP 800-90C}, - month = {March}, - year = {2021} -} - -@Article{ BaLuMi:11, - author = {Mathieu Baudet and David Lubicz and Julien Micolod and - Andr{\'{e}} Tassiaux}, - title = {On the Security of Oscillator-Based Random Number - Generators}, - journal = {J. Cryptology}, - volume = {24}, - number = {2}, - pages = {398--425}, - doi = {10.1007/s00145-010-9089-3}, - year = {2011} -} - -@Article{ BeRePa:14, - author = {Georg T. Becker and Francesco Regazzoni and Christof Paar - and Wayne P. Burleson}, - title = {Stealthy dopant-level hardware Trojans: extended version}, - journal = {J. Cryptographic Engineering}, - volume = {4}, - number = {1}, - pages = {19--31}, - publisher = {Springer}, - doi = {10.1007/s13389-013-0068-0}, - year = {2014} -} - -@Article{ Bl86, - author = {Manuel Blum}, - title = {Independent unbiased coin flips from a correlated biased - source -- A finite state Markov chain}, - journal = {Combinatorica}, - volume = {6}, - number = {2}, - pages = {97--108}, - doi = {10.1007/BF02579167}, - year = {1986} -} - -@Article{ BlBlSh86, - author = {Lenore Blum and Manuel Blum and Mike Shub}, - title = {A Simple Unpredictable Pseudo-Random Number Generator}, - journal = {{SIAM} J. Comput.}, - volume = {15}, - number = {2}, - pages = {364--383}, - doi = {10.1137/0215025}, - publisher = {{SIAM}}, - year = {1986} -} - -@InProceedings{ ChMaGa:16, - author = {Stephen Checkoway and Jacob Maskiewicz and Christina - Garman and Joshua Fried and Shaanan Cohney and Matthew - Green and Nadia Heninger and Ralf{-}Philipp Weinmann and - Eric Rescorla and Hovav Shacham}, - title = {A Systematic Analysis of the Juniper Dual {EC} Incident}, - booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on - Computer and Communications Security, Vienna, Austria, - October 24-28, 2016}, - pages = {468--479}, - crossref = {_WeKaKr:16}, - doi = {10.1145/2976749.2978395}, - year = {2016} -} - -@Article{ ChMaGa:18, - author = {Stephen Checkoway and Jacob Maskiewicz and Christina - Garman and Joshua Fried and Shaanan Cohney and Matthew - Green and Nadia Heninger and Ralf{-}Philipp Weinmann and - Eric Rescorla and Hovav Shacham}, - title = {Where did {I} leave my keys?: lessons from the Juniper - Dual {EC} incident}, - journal = {Commun. {ACM}}, - volume = {61}, - number = {11}, - pages = {148--155}, - publisher = {{ACM}}, - doi = {10.1145/3266291}, - year = {2018} -} - -@Misc{ Cr17, - author = {Common Criteria}, - title = {Common Methodology for Information Technology Security - Evaluation: Evaluation methodology}, - howpublished = {Specification: Version 3.1 Revision 5}, - url = {https://commoncriteriaportal.org/cc/}, - month = {April}, - year = {2017} -} - -@Misc{ Da02, - author = {Robert B. Davies}, - title = {Exclusive OR (XOR) and hardware random number generators}, - howpublished = {Author-hosted manuscript}, - url = {http://www.robertnz.net/pdf/xor2.pdf}, - month = {February}, - year = {2002} -} - -@Book{ DaRo58, - author = {Wilbur B. Davenport Jr. and William L. Root}, - title = {An Introduction to the Theory of Random Signals and - Noise}, - url = {https://ieeexplore.ieee.org/servlet/opac?bknumber=5265617}, - pages = {401}, - publisher = {McGraw-Hill}, - year = {1958} -} - -@Article{ El72, - author = {Peter Elias}, - title = {The Efficient Construction of an Unbiased Random - Sequence}, - journal = {Ann. Math. Statist.}, - volume = {43}, - number = {3}, - pages = {865--870}, - doi = {10.1214/aoms/1177692552}, - publisher = {Institute of Mathematical Statistics}, - year = {1972} -} - -@InProceedings{ EvPo16, - author = {Dmitry Evtyushkin and Dmitry V. Ponomarev}, - title = {Covert Channels through Random Number Generator: - Mechanisms, Capacity Estimation and Mitigations}, - booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on - Computer and Communications Security, Vienna, Austria, - October 24-28, 2016}, - pages = {843--857}, - crossref = {_WeKaKr:16}, - doi = {10.1145/2976749.2978374}, - year = {2016} -} - -@InProceedings{ Gr96, - author = {Lov K. Grover}, - title = {A Fast Quantum Mechanical Algorithm for Database Search}, - booktitle = {Proceedings of the Twenty-eighth Annual ACM Symposium on - Theory of Computing}, - series = {STOC '96}, - pages = {212--219}, - url = {http://arxiv.org/pdf/quant-ph/9605043}, - doi = {10.1145/237814.237866}, - publisher = {{ACM}}, - year = 1996 -} - -@InProceedings{ GrLaRo:16, - author = {Markus Grassl and Brandon Langenberg and Martin Roetteler - and Rainer Steinwandt}, - title = {Applying Grover's Algorithm to {AES:} Quantum Resource - Estimates}, - booktitle = {Post-Quantum Cryptography - 7th International Workshop, - PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, - Proceedings}, - pages = {29--43}, - crossref = {_Ta16}, - url = {https://arxiv.org/pdf/1512.04965.pdf}, - doi = {10.1007/978-3-319-29360-8\_3}, - year = {2016} -} - -@Misc{ HaKoMa12, - author = {Mike Hamburg and Paul Kocher and Mark E. Marson}, - title = {Analysis of Intel's Ivy Bridge Digital Random Number - Generator}, - howpublished = {Technical Report, Cryptography Research (Prepared for - Intel)}, - month = {March}, - year = {2012} -} - -@Article{ HaLe98, - author = {Ali Hajimiri and Thomas H. Lee}, - title = {A general theory of phase noise in electrical - oscillators}, - journal = {IEEE Journal of Solid-State Circuits}, - volume = {33}, - number = {2}, - pages = {179--194}, - publisher = {{IEEE}}, - doi = {10.1109/4.658619}, - year = {1998} -} - -@Article{ HaLiLe99, - author = {Ali Hajimiri and Sotirios Limotyrakis and Thomas H. Lee}, - title = {Jitter and phase noise in ring oscillators}, - journal = { {IEEE} Journal of Solid-State Circuits}, - volume = {34}, - number = {6}, - doi = {10.1109/4.766813}, - url = {https://authors.library.caltech.edu/4916/1/HAJieeejssc99a.pdf}, - pages = {790--804}, - month = {June}, - year = {1999} -} - -@Article{ HuHe20, - author = {Darren Hurley-Smith and Julio C\'esar Hern\'andez-Castro}, - title = {Quantum Leap and Crash: Searching and Finding Bias in - Quantum Random Number Generators}, - journal = {ACM Transactions on Privacy and Security}, - volume = {23}, - number = {3}, - pages = {1--25}, - doi = {10.1145/3403643}, - publisher = {{ACM}}, - month = {June}, - year = {2020} -} - -@TechReport{ IS16, - author = {{ISO}}, - type = {Standard}, - title = {Information technology -- Security techniques -- Testing - methods for the mitigation of non-invasive attack classes - against cryptographic modules}, - shorttitle = {{ISO}/{IEC} 17825:2016}, - language = {en}, - number = {ISO/IEC 17825:2016}, - institution = {International Organization for Standardization}, - year = {2016} -} - -@Misc{ IT19, - author = {ITU}, - title = {Quantum noise random number generator architecture}, - howpublished = {Recommendation ITU-T X.1702}, - url = {https://www.itu.int/rec/T-REC-X.1702-201911-I/en}, - publisher = {International Telecommunications Union}, - month = {November}, - year = {2019} -} - -@Misc{ In20, - author = {Intel}, - title = {Deep Dive: Special Register Buffer Data Sampling}, - url = {https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling}, - howpublished = {Intel Developer Zone}, - publisher = {Intel}, - month = {June}, - year = {2020} -} - -@Misc{ In20A, - author = {Intel}, - title = {{SRBDS} Mitigation Impact on Intel Secure Key}, - url = {https://software.intel.com/security-software-guidance/insights/srbds-mitigation-impact-intel-secure-key}, - howpublished = {Intel Developer Zone}, - publisher = {Intel}, - month = {June}, - year = {2020} -} - -@InProceedings{ JaNaRo:20, - author = {Samuel Jaques and Michael Naehrig and Martin Roetteler and - Fernando Virdia}, - title = {Implementing Grover Oracles for Quantum Key Search on - {AES} and LowMC}, - booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual - International Conference on the Theory and Applications of - Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, - Proceedings, Part {II}}, - pages = {280--310}, - crossref = {_CaIs20}, - url = {https://arxiv.org/pdf/1910.01700.pdf}, - doi = {10.1007/978-3-030-45724-2\_10}, - year = {2020} -} - -@Article{ KaScVe13, - author = {Dusko Karaklajic and J{\"{o}}rn{-}Marc Schmidt and Ingrid - Verbauwhede}, - title = {Hardware Designer's Guide to Fault Attacks}, - journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, - volume = {21}, - number = {12}, - pages = {2295--2306}, - doi = {10.1109/TVLSI.2012.2231707}, - publisher = {IEEE}, - year = {2013} -} - -@Misc{ KiSc01, - author = {Wolfgang Killmann and Werner Schindler}, - title = {A Proposal for: Functionality classes and evaluation - methodology for true (physical) random number generators}, - howpublished = {AIS 31, Version 3.1, English Translation, BSI}, - url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_evaluation_methodology_for_true_RNG_e.html}, - publisher = {BSI}, - month = {September}, - year = {2001} -} - -@Misc{ KiSc11, - author = {Wolfgang Killmann and Werner Schindler}, - title = {A Proposal for: Functionality classes for random number - generators}, - howpublished = {AIS 20 / AIS 31, Version 2.0, English Translation, BSI}, - url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_for_random_number_generators_e.html}, - publisher = {BSI}, - month = {September}, - year = {2011} -} - -@Misc{ KoXiHu:21, - author = {Nick Kossifidis and Joe Xie and Bill Huffman and Allen - Baum and Greg Favor and Tariq Kurd and Fumio Arakawa}, - title = {{PMP} Enhancements for memory access and execution - prevention on Machine mode}, - howpublished = {Version 0.9.1 -- {RISC}-{V} {TEE} Task Group}, - month = {May}, - year = {2021} +@Misc{ AM17, + author = {{AMD}}, + title = {{AMD} Random Number Generator}, + howpublished = {AMD TechDocs}, + publisher = {Advanced Micro Devices}, + url = {https://www.amd.com/system/files/TechDocs/amd-random-number-generator.pdf}, + month = {June}, + year = {2017} +} + +@Misc{ AR17, + author = {{ARM}}, + title = {ARM TrustZone True Random Number Generator: Technical Reference Manual}, + howpublished = {ARM 100976\_0000\_00\_en (rev. r0p0)}, + publisher = {{ARM}}, + url = {http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100976_0000_00_en}, + month = {May}, + year = {2017} +} + +@Misc{ AR20, + author = {{ARM}}, + title = {Arm Architecture Registers: Armv8, for Armv8-A + architecture profile}, + howpublished = {ARM DDI 0595 (ID033020)}, + publisher = {{ARM}}, + url = {https://developer.arm.com/docs/ddi0595/g}, + month = {April}, + year = {2020} +} + +@Book{ An20, + author = {Ross J. Anderson}, + title = {Security engineering - a guide to building dependable + distributed systems {(3.} ed.)}, + publisher = {Wiley}, + isbn = {978-1-119-64278-7}, + url = {https://www.cl.cam.ac.uk/~rja14/book.html}, + month = {December}, + year = {2020} +} + +@Misc{ BS13, + author = {{BSI}}, + title = {Evaluation of random number generators}, + howpublished = {Version 0.10, BSI}, + url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_AIS_31_Evaluation_of_random_number_generators_e.html}, + publisher = {BSI}, + month = {March}, + year = {2013} +} + +@Misc{ Ba20, + author = {Elaine Barker}, + title = {Recommendation for Key Management: Part 1 -- General}, + howpublished = {NIST Special Publication SP 0 Part 1, Revision 5}, + doi = {10.6028/NIST.SP.800-57pt1r5}, + publisher = {{NIST}}, + month = {May}, + year = {2020} +} + +@Article{ Ba86, + author = {Per Bak}, + title = {The Devil's Staircase}, + journal = {Phys. Today}, + volume = {39}, + number = {12}, + pages = {38--45}, + doi = {10.1063/1.881047}, + publisher = {{AIP}}, + month = {December}, + year = {1986} +} + +@Misc{ BaBa19, + author = {Elaine Barker and William Barker}, + title = {Recommendation for Key Management: Part 2 -- Best + Practices for Key Management Organizations}, + howpublished = {NIST Special Publication SP 800-57 Part 2, Revision 1}, + doi = {10.6028/NIST.SP.800-57pt2r1}, + publisher = {{NIST}}, + month = {May}, + year = {2019} +} + +@Misc{ BaDa15, + author = {Elaine Barker and Quynh Dang}, + title = {Recommendation for Key Management, Part 3: + Application-Specific Key Management Guidance}, + howpublished = {NIST Special Publication SP 800-57 Part 3, Revision 1}, + doi = {10.6028/NIST.SP.800-57pt3r1}, + publisher = {{NIST}}, + month = {January}, + year = {2015} +} + +@InProceedings{ BaFoKa:12, + author = {Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and + Lorenzo Simionato and Graham Steel and Joe{-}Kai Tsay}, + title = {Efficient Padding Oracle Attacks on Cryptographic + Hardware}, + booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual + Cryptology Conference, Santa Barbara, CA, USA, August + 19-23, 2012. Proceedings}, + pages = {608--625}, + crossref = {_SaCa12}, + doi = {10.1007/978-3-642-32009-5\_36}, + year = {2012} +} + +@Misc{ BaKe15, + author = {Elaine Barker and John Kelsey}, + title = {Recommendation for Random Number Generation Using + Deterministic Random Bit Generators}, + howpublished = {NIST Special Publication SP 800-90A Revision 1}, + doi = {10.6028/NIST.SP.800-90Ar1}, + month = {June}, + year = {2015} +} + +@Misc{ BaKeRo:21, + author = {Elaine Barker and John Kelsey and Allen Roginsky and + Meltem Sönmez Turan and Darryl Buller and Aaron Kaufer}, + title = {Recommendation for Random Bit Generator ({RBG}) + Constructions}, + howpublished = {Draft NIST Special Publication SP 800-90C}, + month = {March}, + year = {2021} +} + +@Article{ BaLuMi:11, + author = {Mathieu Baudet and David Lubicz and Julien Micolod and + Andr{\'{e}} Tassiaux}, + title = {On the Security of Oscillator-Based Random Number + Generators}, + journal = {J. Cryptology}, + volume = {24}, + number = {2}, + pages = {398--425}, + doi = {10.1007/s00145-010-9089-3}, + year = {2011} +} + +@Article{ BeRePa:14, + author = {Georg T. Becker and Francesco Regazzoni and Christof Paar + and Wayne P. Burleson}, + title = {Stealthy dopant-level hardware Trojans: extended version}, + journal = {J. Cryptographic Engineering}, + volume = {4}, + number = {1}, + pages = {19--31}, + publisher = {Springer}, + doi = {10.1007/s13389-013-0068-0}, + year = {2014} +} + +@Article{ Bl86, + author = {Manuel Blum}, + title = {Independent unbiased coin flips from a correlated biased + source -- A finite state Markov chain}, + journal = {Combinatorica}, + volume = {6}, + number = {2}, + pages = {97--108}, + doi = {10.1007/BF02579167}, + year = {1986} +} + +@Article{ BlBlSh86, + author = {Lenore Blum and Manuel Blum and Mike Shub}, + title = {A Simple Unpredictable Pseudo-Random Number Generator}, + journal = {{SIAM} J. Comput.}, + volume = {15}, + number = {2}, + pages = {364--383}, + doi = {10.1137/0215025}, + publisher = {{SIAM}}, + year = {1986} +} + +@InProceedings{ ChMaGa:16, + author = {Stephen Checkoway and Jacob Maskiewicz and Christina + Garman and Joshua Fried and Shaanan Cohney and Matthew + Green and Nadia Heninger and Ralf{-}Philipp Weinmann and + Eric Rescorla and Hovav Shacham}, + title = {A Systematic Analysis of the Juniper Dual {EC} Incident}, + booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on + Computer and Communications Security, Vienna, Austria, + October 24-28, 2016}, + pages = {468--479}, + crossref = {_WeKaKr:16}, + doi = {10.1145/2976749.2978395}, + year = {2016} +} + +@Article{ ChMaGa:18, + author = {Stephen Checkoway and Jacob Maskiewicz and Christina + Garman and Joshua Fried and Shaanan Cohney and Matthew + Green and Nadia Heninger and Ralf{-}Philipp Weinmann and + Eric Rescorla and Hovav Shacham}, + title = {Where did {I} leave my keys?: lessons from the Juniper + Dual {EC} incident}, + journal = {Commun. {ACM}}, + volume = {61}, + number = {11}, + pages = {148--155}, + publisher = {{ACM}}, + doi = {10.1145/3266291}, + year = {2018} +} + +@Misc{ Cr17, + author = {Common Criteria}, + title = {Common Methodology for Information Technology Security + Evaluation: Evaluation methodology}, + howpublished = {Specification: Version 3.1 Revision 5}, + url = {https://commoncriteriaportal.org/cc/}, + month = {April}, + year = {2017} +} + +@Misc{ Da02, + author = {Robert B. Davies}, + title = {Exclusive OR (XOR) and hardware random number generators}, + howpublished = {Author-hosted manuscript}, + url = {http://www.robertnz.net/pdf/xor2.pdf}, + month = {February}, + year = {2002} +} + +@Book{ DaRo58, + author = {Wilbur B. Davenport Jr. and William L. Root}, + title = {An Introduction to the Theory of Random Signals and + Noise}, + url = {https://ieeexplore.ieee.org/servlet/opac?bknumber=5265617}, + pages = {401}, + publisher = {McGraw-Hill}, + year = {1958} +} + +@Article{ El72, + author = {Peter Elias}, + title = {The Efficient Construction of an Unbiased Random + Sequence}, + journal = {Ann. Math. Statist.}, + volume = {43}, + number = {3}, + pages = {865--870}, + doi = {10.1214/aoms/1177692552}, + publisher = {Institute of Mathematical Statistics}, + year = {1972} +} + +@InProceedings{ EvPo16, + author = {Dmitry Evtyushkin and Dmitry V. Ponomarev}, + title = {Covert Channels through Random Number Generator: + Mechanisms, Capacity Estimation and Mitigations}, + booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on + Computer and Communications Security, Vienna, Austria, + October 24-28, 2016}, + pages = {843--857}, + crossref = {_WeKaKr:16}, + doi = {10.1145/2976749.2978374}, + year = {2016} +} + +@InProceedings{ Gr96, + author = {Lov K. Grover}, + title = {A Fast Quantum Mechanical Algorithm for Database Search}, + booktitle = {Proceedings of the Twenty-eighth Annual ACM Symposium on + Theory of Computing}, + series = {STOC '96}, + pages = {212--219}, + url = {http://arxiv.org/pdf/quant-ph/9605043}, + doi = {10.1145/237814.237866}, + publisher = {{ACM}}, + year = 1996 +} + +@InProceedings{ GrLaRo:16, + author = {Markus Grassl and Brandon Langenberg and Martin Roetteler + and Rainer Steinwandt}, + title = {Applying Grover's Algorithm to {AES:} Quantum Resource + Estimates}, + booktitle = {Post-Quantum Cryptography - 7th International Workshop, + PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, + Proceedings}, + pages = {29--43}, + crossref = {_Ta16}, + url = {https://arxiv.org/pdf/1512.04965.pdf}, + doi = {10.1007/978-3-319-29360-8\_3}, + year = {2016} +} + +@Misc{ HaKoMa12, + author = {Mike Hamburg and Paul Kocher and Mark E. Marson}, + title = {Analysis of Intel's Ivy Bridge Digital Random Number + Generator}, + howpublished = {Technical Report, Cryptography Research (Prepared for + Intel)}, + month = {March}, + year = {2012} +} + +@Article{ HaLe98, + author = {Ali Hajimiri and Thomas H. Lee}, + title = {A general theory of phase noise in electrical + oscillators}, + journal = {IEEE Journal of Solid-State Circuits}, + volume = {33}, + number = {2}, + pages = {179--194}, + publisher = {{IEEE}}, + doi = {10.1109/4.658619}, + year = {1998} +} + +@Article{ HaLiLe99, + author = {Ali Hajimiri and Sotirios Limotyrakis and Thomas H. Lee}, + title = {Jitter and phase noise in ring oscillators}, + journal = { {IEEE} Journal of Solid-State Circuits}, + volume = {34}, + number = {6}, + doi = {10.1109/4.766813}, + url = {https://authors.library.caltech.edu/4916/1/HAJieeejssc99a.pdf}, + pages = {790--804}, + month = {June}, + year = {1999} +} + +@Article{ HuHe20, + author = {Darren Hurley-Smith and Julio C\'esar Hern\'andez-Castro}, + title = {Quantum Leap and Crash: Searching and Finding Bias in + Quantum Random Number Generators}, + journal = {ACM Transactions on Privacy and Security}, + volume = {23}, + number = {3}, + pages = {1--25}, + doi = {10.1145/3403643}, + publisher = {{ACM}}, + month = {June}, + year = {2020} +} + +@TechReport{ IS16, + author = {{ISO}}, + type = {Standard}, + title = {Information technology -- Security techniques -- Testing + methods for the mitigation of non-invasive attack classes + against cryptographic modules}, + shorttitle = {{ISO}/{IEC} 17825:2016}, + language = {en}, + number = {ISO/IEC 17825:2016}, + institution = {International Organization for Standardization}, + year = {2016} +} + +@Misc{ IT19, + author = {ITU}, + title = {Quantum noise random number generator architecture}, + howpublished = {Recommendation ITU-T X.1702}, + url = {https://www.itu.int/rec/T-REC-X.1702-201911-I/en}, + publisher = {International Telecommunications Union}, + month = {November}, + year = {2019} +} + +@Misc{ In20, + author = {Intel}, + title = {Deep Dive: Special Register Buffer Data Sampling}, + url = {https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling}, + howpublished = {Intel Developer Zone}, + publisher = {Intel}, + month = {June}, + year = {2020} +} + +@Misc{ In20A, + author = {Intel}, + title = {{SRBDS} Mitigation Impact on Intel Secure Key}, + url = {https://software.intel.com/security-software-guidance/insights/srbds-mitigation-impact-intel-secure-key}, + howpublished = {Intel Developer Zone}, + publisher = {Intel}, + month = {June}, + year = {2020} +} + +@InProceedings{ JaNaRo:20, + author = {Samuel Jaques and Michael Naehrig and Martin Roetteler and + Fernando Virdia}, + title = {Implementing Grover Oracles for Quantum Key Search on + {AES} and LowMC}, + booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual + International Conference on the Theory and Applications of + Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, + Proceedings, Part {II}}, + pages = {280--310}, + crossref = {_CaIs20}, + url = {https://arxiv.org/pdf/1910.01700.pdf}, + doi = {10.1007/978-3-030-45724-2\_10}, + year = {2020} +} + +@Article{ KaScVe13, + author = {Dusko Karaklajic and J{\"{o}}rn{-}Marc Schmidt and Ingrid + Verbauwhede}, + title = {Hardware Designer's Guide to Fault Attacks}, + journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, + volume = {21}, + number = {12}, + pages = {2295--2306}, + doi = {10.1109/TVLSI.2012.2231707}, + publisher = {IEEE}, + year = {2013} +} + +@Misc{ KiSc01, + author = {Wolfgang Killmann and Werner Schindler}, + title = {A Proposal for: Functionality classes and evaluation + methodology for true (physical) random number generators}, + howpublished = {AIS 31, Version 3.1, English Translation, BSI}, + url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_evaluation_methodology_for_true_RNG_e.html}, + publisher = {BSI}, + month = {September}, + year = {2001} +} + +@Misc{ KiSc11, + author = {Wolfgang Killmann and Werner Schindler}, + title = {A Proposal for: Functionality classes for random number + generators}, + howpublished = {AIS 20 / AIS 31, Version 2.0, English Translation, BSI}, + url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_for_random_number_generators_e.html}, + publisher = {BSI}, + month = {September}, + year = {2011} +} + +@Misc{ KoXiHu:21, + author = {Nick Kossifidis and Joe Xie and Bill Huffman and Allen + Baum and Greg Favor and Tariq Kurd and Fumio Arakawa}, + title = {{PMP} Enhancements for memory access and execution + prevention on Machine mode}, + howpublished = {Version 0.9.1 -- {RISC}-{V} {TEE} Task Group}, + month = {May}, + year = {2021} } 10.1007/978-3-540-71039-4\_21 -@InProceedings{ La08, - author = {Patrick Lacharme}, - title = {Post-Processing Functions for a Biased Physical Random - Number Generator}, - booktitle = {Fast Software Encryption, 15th International Workshop, - {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, - Revised Selected Papers}, - pages = {334--342}, - crossref = {_Ny08}, - doi = {10.1007/978-3-540-71039-4\_21}, - year = {2008} -} - -@Article{ LiBaBo:13, - author = {John S. Liberty and Adrian Barrera and David W. Boerstler - and Thomas B. Chadwick and Scott R. Cottier and H. Peter - Hofstee and Julie A. Rosser and Marty L. Tsai}, - title = {True hardware random number generation implemented in the - 32-nm {SOI} {POWER7+} processor}, - journal = {{IBM} J. Res. Dev.}, - volume = {57}, - number = {6}, - doi = {10.1147/JRD.2013.2279599}, - year = {2013} -} - -@InProceedings{ MaMo09, - author = {A. Theodore Markettos and Simon W. Moore}, - title = {The Frequency Injection Attack on Ring-Oscillator-Based - True Random Number Generators}, - booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, - 11th International Workshop, Lausanne, Switzerland, - September 6-9, 2009, Proceedings}, - pages = {317--331}, - crossref = {_ClGa09}, - doi = {10.1007/978-3-642-04138-9\_23}, - year = {2009} -} - -@Misc{ Me18, - author = {John P. Mechalas}, - title = {Intel Digital Random Number Generator (DRNG) Software - Implementation Guide}, - howpublished = {Intel Technical Report, Version 2.1}, - url = {https://software.intel.com/content/www/us/en/develop/articles/intel-digital-random-number-generator-drng-software-implementation-guide.html}, - month = {October}, - year = {2018} -} - -@InProceedings{ MoSuEi:20, - author = {Daniel Moghimi and Berk Sunar and Thomas Eisenbarth and - Nadia Heninger}, - title = {{TPM}-{FAIL}: {TPM} meets Timing and Lattice Attacks}, - booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)}, - url = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-tpm}, - pages = {To appear}, - publisher = {{USENIX} Association}, - month = {August}, - year = {2020} -} - -@Misc{ Mu20, - author = {Stephan M\"uller}, - title = {Documentation and Analysis of the Linux Random Number - Generator, Version 3.6}, - howpublished = {Prepared for BSI by atsec information security GmbH}, - url = {https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/LinuxRNG/LinuxRNG_EN.pdf}, - month = {April}, - year = {2020} -} - -@Misc{ NC20, - author = {NCSC}, - title = {Quantum security technologies}, - howpublished = {White paper, Version 1.0. National Cyber Security Centre - (UK).}, - url = {https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies}, - month = {March}, - year = {2020} -} - -@Misc{ NI16, - author = {{NIST}}, - title = {Submission Requirements and Evaluation Criteria for the - Post-Quantum Cryptography Standardization Process}, - howpublished = {Official Call for Proposals, National Institute for - Standards and Technology}, - url = {http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-final-dec-2016.pdf}, - month = {December}, - year = 2016 -} - -@Misc{ NI19, - author = {{NIST}}, - title = {Security Requirements for Cryptographic Modules}, - howpublished = {Federal Information Processing Standards Publication FIPS - 140-3}, +@InProceedings{ La08, + author = {Patrick Lacharme}, + title = {Post-Processing Functions for a Biased Physical Random + Number Generator}, + booktitle = {Fast Software Encryption, 15th International Workshop, + {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, + Revised Selected Papers}, + pages = {334--342}, + crossref = {_Ny08}, + doi = {10.1007/978-3-540-71039-4\_21}, + year = {2008} +} + +@Article{ LiBaBo:13, + author = {John S. Liberty and Adrian Barrera and David W. Boerstler + and Thomas B. Chadwick and Scott R. Cottier and H. Peter + Hofstee and Julie A. Rosser and Marty L. Tsai}, + title = {True hardware random number generation implemented in the + 32-nm {SOI} {POWER7+} processor}, + journal = {{IBM} J. Res. Dev.}, + volume = {57}, + number = {6}, + doi = {10.1147/JRD.2013.2279599}, + year = {2013} +} + +@InProceedings{ MaMo09, + author = {A. Theodore Markettos and Simon W. Moore}, + title = {The Frequency Injection Attack on Ring-Oscillator-Based + True Random Number Generators}, + booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, + 11th International Workshop, Lausanne, Switzerland, + September 6-9, 2009, Proceedings}, + pages = {317--331}, + crossref = {_ClGa09}, + doi = {10.1007/978-3-642-04138-9\_23}, + year = {2009} +} + +@Misc{ Me18, + author = {John P. Mechalas}, + title = {Intel Digital Random Number Generator (DRNG) Software + Implementation Guide}, + howpublished = {Intel Technical Report, Version 2.1}, + url = {https://software.intel.com/content/www/us/en/develop/articles/intel-digital-random-number-generator-drng-software-implementation-guide.html}, + month = {October}, + year = {2018} +} + +@InProceedings{ MoSuEi:20, + author = {Daniel Moghimi and Berk Sunar and Thomas Eisenbarth and + Nadia Heninger}, + title = {{TPM}-{FAIL}: {TPM} meets Timing and Lattice Attacks}, + booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)}, + url = {https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-tpm}, + pages = {To appear}, + publisher = {{USENIX} Association}, + month = {August}, + year = {2020} +} + +@Misc{ Mu20, + author = {Stephan M\"uller}, + title = {Documentation and Analysis of the Linux Random Number + Generator, Version 3.6}, + howpublished = {Prepared for BSI by atsec information security GmbH}, + url = {https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/LinuxRNG/LinuxRNG_EN.pdf}, + month = {April}, + year = {2020} +} + +@Misc{ NC20, + author = {NCSC}, + title = {Quantum security technologies}, + howpublished = {White paper, Version 1.0. National Cyber Security Centre + (UK).}, + url = {https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies}, + month = {March}, + year = {2020} +} + +@Misc{ NI16, + author = {{NIST}}, + title = {Submission Requirements and Evaluation Criteria for the + Post-Quantum Cryptography Standardization Process}, + howpublished = {Official Call for Proposals, National Institute for + Standards and Technology}, + url = {http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-final-dec-2016.pdf}, + month = {December}, + year = 2016 +} + +@Misc{ NI19, + author = {{NIST}}, + title = {Security Requirements for Cryptographic Modules}, + howpublished = {Federal Information Processing Standards Publication FIPS + 140-3}, url = {https://doi.org/10.6028/NIST.FIPS.140-3}, - month = {March}, - year = {2019} -} - -@Misc{ NICC21, - author = {{NIST} and {CCCS}}, - title = {Implementation Guidance for {FIPS} 140-3 and the - Cryptographic Module Validation Program}, - howpublished = {CMVP}, - url = {https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf}, - month = {May}, - year = {2021} -} - -@Misc{ NS15, - author = {{NSA}/{CSS}}, - title = {Commercial National Security Algorithm Suite}, - url = {https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm}, - month = {August}, - year = 2015 -} - -@InCollection{ Ne51, - title = {Various Techniques Used in Connection with Random Digits}, - author = {von Neumann, John}, - booktitle = {Monte Carlo Method}, - editor = {Householder, A.~S. and Forsythe, G.~E. and Germond, - H.~H.}, - series = {National Bureau of Standards Applied Mathematics Series}, - volume = {12}, - chapter = {13}, - pages = {36--38}, - publisher = {US Government Printing Office}, - address = {Washington, DC}, - url = {https://mcnp.lanl.gov/pdf_files/nbs_vonneumann.pdf}, - year = {1951} -} - -@Misc{ Ra20, - author = {Rambus}, - title = {TRNG-IP-76 / EIP-76 Family of FIPS Approved True Random - Generators}, - howpublished = {Commercial Crypto IP. Formerly (2017) available from - Inside Secure.}, - url = {https://www.rambus.com/security/crypto-accelerator-hardware-cores/basic-crypto-blocks/trng-ip-76/}, - year = {2020} -} - -@InProceedings{ RaMiRa:21, - author = {Hany Ragab and Alyssa Milburn and Kaveh Razavi and Herbert - Bos and Cristiano Giuffrida}, - title = {CrossTalk : Speculative Data Leaks Across Cores Are Real}, - booktitle = {IEEE Symposium on Security \& Privacy 2021}, - url = {https://download.vusec.net/papers/crosstalk_sp21.pdf}, - pages = {To appear}, - publisher = {IEEE}, - month = {May}, - year = {2021} -} - -@Article{ Ri44, - author = {Stephen O. Rice}, - title = {Mathematical analysis of random noise (Parts I-II)}, - journal = {The Bell System Technical Journal}, - volume = {23}, - number = {3}, - pages = {282--332}, - doi = {10.1002/j.1538-7305.1944.tb00874.x}, - month = {July}, - year = {1944} -} - -@Article{ Ri45, - author = {Stephen O. Rice}, - title = {Mathematical analysis of random noise (Parts III-IV))}, - journal = {The Bell System Technical Journal}, - volume = {24}, - number = {1}, - pages = {46--156}, - doi = {10.1002/j.1538-7305.1945.tb00453.x}, - month = {January}, - year = {1945} -} - -@Misc{ RuSoNe:10, - author = {Andrew Rukhin and Juan Soto and James Nechvatal and Miles - Smid and Elaine Barker and Stefan Leigh and Mark Levenson - and Mark Vangel and David Banks and Alan Heckert and - JamesDray and San Vo}, - title = {A Statistical Test Suite for Random and Pseudorandom - Number Generators for Cryptographic Applications}, - doi = {10.6028/NIST.SP.800-22r1a}, - month = {April}, - year = {2010} -} - -@Misc{ Sa19, - author = {Jim Salter}, - title = {How a months-old {AMD} microcode bug destroyed my - weekend}, - howpublished = {Ars Technica}, - url = {https://arstechnica.com/gadgets/2019/10/how-a-months-old-amd-microcode-bug-destroyed-my-weekend/}, - month = {October}, - year = {2019} -} - -@InProceedings{ Sa20, - author = {Markku-Juhani O. Saarinen}, - title = {A Lightweight ISA Extension for {AES} and {SM4}}, - booktitle = {First International Workshop on Secure RISC-V Architecture - Design Exploration (SECRISC-V'20)}, - url = {https://arxiv.org/abs/2002.07041}, - publisher = {IEEE}, - month = {August}, - year = {2020} -} - - -@InProceedings{ SaNeMa20, - author = {Markku-Juhani O. Saarinen and G. Richard Newell and Ben - Marshall}, - title = {Building a Modern {TRNG}: An Entropy Source Interface for - {RISC}-{V}}, - booktitle = {4th Workshop on Attacks and Solutions in Hardware Security - (ASHES’20), November 13, 2020, Virtual Event, USA.}, - doi = {10.1145/3411504.3421212}, - publisher = {ACM}, - pages = {93--102}, - month = {November}, - year = 2020 + month = {March}, + year = {2019} +} + +@Misc{ NICC21, + author = {{NIST} and {CCCS}}, + title = {Implementation Guidance for {FIPS} 140-3 and the + Cryptographic Module Validation Program}, + howpublished = {CMVP}, + url = {https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf}, + month = {May}, + year = {2021} +} + +@Misc{ NS15, + author = {{NSA}/{CSS}}, + title = {Commercial National Security Algorithm Suite}, + url = {https://apps.nsa.gov/iaarchive/programs/iad-initiatives/cnsa-suite.cfm}, + month = {August}, + year = 2015 +} + +@InCollection{ Ne51, + title = {Various Techniques Used in Connection with Random Digits}, + author = {von Neumann, John}, + booktitle = {Monte Carlo Method}, + editor = {Householder, A.~S. and Forsythe, G.~E. and Germond, + H.~H.}, + series = {National Bureau of Standards Applied Mathematics Series}, + volume = {12}, + chapter = {13}, + pages = {36--38}, + publisher = {US Government Printing Office}, + address = {Washington, DC}, + url = {https://mcnp.lanl.gov/pdf_files/nbs_vonneumann.pdf}, + year = {1951} +} + +@Misc{ Ra20, + author = {Rambus}, + title = {TRNG-IP-76 / EIP-76 Family of FIPS Approved True Random + Generators}, + howpublished = {Commercial Crypto IP. Formerly (2017) available from + Inside Secure.}, + url = {https://www.rambus.com/security/crypto-accelerator-hardware-cores/basic-crypto-blocks/trng-ip-76/}, + year = {2020} +} + +@InProceedings{ RaMiRa:21, + author = {Hany Ragab and Alyssa Milburn and Kaveh Razavi and Herbert + Bos and Cristiano Giuffrida}, + title = {CrossTalk : Speculative Data Leaks Across Cores Are Real}, + booktitle = {IEEE Symposium on Security \& Privacy 2021}, + url = {https://download.vusec.net/papers/crosstalk_sp21.pdf}, + pages = {To appear}, + publisher = {IEEE}, + month = {May}, + year = {2021} +} + +@Article{ Ri44, + author = {Stephen O. Rice}, + title = {Mathematical analysis of random noise (Parts I-II)}, + journal = {The Bell System Technical Journal}, + volume = {23}, + number = {3}, + pages = {282--332}, + doi = {10.1002/j.1538-7305.1944.tb00874.x}, + month = {July}, + year = {1944} +} + +@Article{ Ri45, + author = {Stephen O. Rice}, + title = {Mathematical analysis of random noise (Parts III-IV))}, + journal = {The Bell System Technical Journal}, + volume = {24}, + number = {1}, + pages = {46--156}, + doi = {10.1002/j.1538-7305.1945.tb00453.x}, + month = {January}, + year = {1945} +} + +@Misc{ RuSoNe:10, + author = {Andrew Rukhin and Juan Soto and James Nechvatal and Miles + Smid and Elaine Barker and Stefan Leigh and Mark Levenson + and Mark Vangel and David Banks and Alan Heckert and + JamesDray and San Vo}, + title = {A Statistical Test Suite for Random and Pseudorandom + Number Generators for Cryptographic Applications}, + doi = {10.6028/NIST.SP.800-22r1a}, + month = {April}, + year = {2010} +} + +@Misc{ Sa19, + author = {Jim Salter}, + title = {How a months-old {AMD} microcode bug destroyed my + weekend}, + howpublished = {Ars Technica}, + url = {https://arstechnica.com/gadgets/2019/10/how-a-months-old-amd-microcode-bug-destroyed-my-weekend/}, + month = {October}, + year = {2019} +} + +@InProceedings{ Sa20, + author = {Markku-Juhani O. Saarinen}, + title = {A Lightweight ISA Extension for {AES} and {SM4}}, + booktitle = {First International Workshop on Secure RISC-V Architecture + Design Exploration (SECRISC-V'20)}, + url = {https://arxiv.org/abs/2002.07041}, + publisher = {IEEE}, + month = {August}, + year = {2020} +} + + +@InProceedings{ SaNeMa20, + author = {Markku-Juhani O. Saarinen and G. Richard Newell and Ben + Marshall}, + title = {Building a Modern {TRNG}: An Entropy Source Interface for + {RISC}-{V}}, + booktitle = {4th Workshop on Attacks and Solutions in Hardware Security + (ASHES’20), November 13, 2020, Virtual Event, USA.}, + doi = {10.1145/3411504.3421212}, + publisher = {ACM}, + pages = {93--102}, + month = {November}, + year = 2020 } @Misc{ Sa21, @@ -1572,212 +1572,212 @@ pages={109-136} year = 2021 } -@Misc{ SaNeMa21, - author = {Markku-Juhani O. Saarinen and G. Richard Newell and Ben - Marshall}, - title = {Development of The {RISC}-{V} Entropy Source Interface}, - howpublished = {{IACR} ePrint 2020/866}, - url = {https://eprint.iacr.org/2029/866}, - publisher = {Submitted For Publication}, - month = {June}, - year = 2021 -} - -@Misc{ Sc99, - author = {Werner Schindler}, - title = {Functionality classes and evaluation methodology for - deterministic random number generators}, - howpublished = {AIS 20, Version 2.0, English Translation, BSI}, - publisher = {BSI}, - url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_Functionality_Classes_Evaluation_Methodology_DRNG_e.html}, - month = {December}, - year = {1999} -} - -@InProceedings{ Sh94, - author = {Peter W. Shor}, - title = {Algorithms for quantum computation: Discrete logarithms - and factoring}, - booktitle = {35th Annual Symposium on Foundations of Computer Science, - Santa Fe, New Mexico, USA, 20-22 November 1994}, - pages = {124--134}, - publisher = {IEEE}, - doi = {10.1109/SFCS.1994.365700}, - url = {https://arxiv.org/abs/quant-ph/9508027}, - year = 1994 -} - -@Misc{ TG20, - author = {{RISC-V} {Crypto} {TG}}, - title = {RISC-V Cryptography Extensions}, - url = {https://github.com/riscv/riscv-crypto}, - howpublished = {Editor's location -- to be integrated with main - specifications}, - year = {2020} +@Misc{ SaNeMa21, + author = {Markku-Juhani O. Saarinen and G. Richard Newell and Ben + Marshall}, + title = {Development of The {RISC}-{V} Entropy Source Interface}, + howpublished = {{IACR} ePrint 2020/866}, + url = {https://eprint.iacr.org/2029/866}, + publisher = {Submitted For Publication}, + month = {June}, + year = 2021 +} + +@Misc{ Sc99, + author = {Werner Schindler}, + title = {Functionality classes and evaluation methodology for + deterministic random number generators}, + howpublished = {AIS 20, Version 2.0, English Translation, BSI}, + publisher = {BSI}, + url = {https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_Functionality_Classes_Evaluation_Methodology_DRNG_e.html}, + month = {December}, + year = {1999} +} + +@InProceedings{ Sh94, + author = {Peter W. Shor}, + title = {Algorithms for quantum computation: Discrete logarithms + and factoring}, + booktitle = {35th Annual Symposium on Foundations of Computer Science, + Santa Fe, New Mexico, USA, 20-22 November 1994}, + pages = {124--134}, + publisher = {IEEE}, + doi = {10.1109/SFCS.1994.365700}, + url = {https://arxiv.org/abs/quant-ph/9508027}, + year = 1994 +} + +@Misc{ TG20, + author = {{RISC-V} {Crypto} {TG}}, + title = {RISC-V Cryptography Extensions}, + url = {https://github.com/riscv/riscv-crypto}, + howpublished = {Editor's location -- to be integrated with main + specifications}, + year = {2020} } @Misc{TuBaKe:18, - author = {Meltem S\"onmez Turan and Elaine Barker and John Kelsey and - Kerry A. McKay and Mary L. Baish and Mike Boyle}, - title = {Recommendation for the Entropy Sources Used for Random Bit - Generation}, - howpublished = {NIST Special Publication SP 800-90B}, - doi = {10.6028/NIST.SP.800-90B}, - month = {January}, - year = {2018} -} - -@InProceedings{ VaDr10, - author = {Michal Varchola and Milos Drutarovsk{\'{y}}}, - title = {New High Entropy Element for {FPGA} Based True Random - Number Generators}, - booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, - 12th International Workshop, Santa Barbara, CA, USA, August - 17-20, 2010. Proceedings}, - pages = {351--365}, - crossref = {_MaSt10}, - doi = {10.1007/978-3-642-15031-9\_24}, - year = {2010} -} - -@InProceedings{ VaFiAu:10, - author = {Boyan Valtchanov and Viktor Fischer and Alain Aubert and - Florent Bernard}, - title = {Characterization of randomness sources in ring - oscillator-based true random number generators in FPGAs}, - booktitle = {13th {IEEE} International Symposium on Design and - Diagnostics of Electronic Circuits and Systems, {DDECS} - 2010, Vienna, Austria, April 14-16, 2010}, - pages = {48--53}, - crossref = {_GrKoSt:10}, - doi = {10.1109/DDECS.2010.5491819}, - year = {2010} -} - -@Proceedings{ _CaIs20, - editor = {Anne Canteaut and Yuval Ishai}, - title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual - International Conference on the Theory and Applications of - Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, - Proceedings, Part {II}}, - series = {Lecture Notes in Computer Science}, - volume = {12106}, - publisher = {Springer}, - doi = {10.1007/978-3-030-45724-2}, - isbn = {978-3-030-45723-5}, - year = {2020} -} - -@Proceedings{ _ClGa09, - editor = {Christophe Clavier and Kris Gaj}, - title = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, - 11th International Workshop, Lausanne, Switzerland, - September 6-9, 2009, Proceedings}, - series = {Lecture Notes in Computer Science}, - volume = {5747}, - publisher = {Springer}, - doi = {10.1007/978-3-642-04138-9}, - isbn = {978-3-642-04137-2}, - year = {2009} -} - -@Proceedings{ _GrKoSt:10, - editor = {Elena Gramatov{\'{a}} and Zdenek Kot{\'{a}}sek and Andreas - Steininger and Heinrich Theodor Vierhaus and Horst - Zimmermann}, - title = {13th {IEEE} International Symposium on Design and - Diagnostics of Electronic Circuits and Systems, {DDECS} - 2010, Vienna, Austria, April 14-16, 2010}, - publisher = {{IEEE} Computer Society}, - url = {https://ieeexplore.ieee.org/xpl/conhome/5484099/proceeding}, - isbn = {978-1-4244-6612-2}, - year = {2010} -} - -@Proceedings{ _MaSt10, - editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, - title = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, - 12th International Workshop, Santa Barbara, CA, USA, August - 17-20, 2010. Proceedings}, - series = {Lecture Notes in Computer Science}, - volume = {6225}, - publisher = {Springer}, - doi = {10.1007/978-3-642-15031-9}, - isbn = {978-3-642-15030-2}, - year = {2010} -} - -@Proceedings{ _Ny08, - editor = {Kaisa Nyberg}, - title = {Fast Software Encryption, 15th International Workshop, - {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, - Revised Selected Papers}, - series = {Lecture Notes in Computer Science}, - volume = {5086}, - publisher = {Springer}, - doi = {10.1007/978-3-540-71039-4}, - isbn = {978-3-540-71038-7}, - year = {2008} -} - -@Proceedings{ _SaCa12, - editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, - title = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual - Cryptology Conference, Santa Barbara, CA, USA, August - 19-23, 2012. Proceedings}, - series = {Lecture Notes in Computer Science}, - volume = {7417}, - publisher = {Springer}, - doi = {10.1007/978-3-642-32009-5}, - isbn = {978-3-642-32008-8}, - year = {2012} -} - -@Proceedings{ _Ta16, - editor = {Tsuyoshi Takagi}, - title = {Post-Quantum Cryptography - 7th International Workshop, - PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, - Proceedings}, - series = {Lecture Notes in Computer Science}, - volume = {9606}, - publisher = {Springer}, - doi = {10.1007/978-3-319-29360-8}, - isbn = {978-3-319-29359-2}, - year = {2016} -} - -@Book{ _WaAs19, - editor = {Andrew Waterman and Krste Asanovi\'c}, - title = {The {RISC}-{V} Instruction Set Manual, Volume I: - User-Level {ISA}}, - note = {Document Version 20191213}, - publisher = {RISC-V Foundation}, - url = {https://riscv.org/specifications/}, - month = {December}, - year = 2019 -} - -@Book{ _WaAs19A, - editor = {Andrew Waterman and Krste Asanovi\'c}, - title = {The {RISC}-{V} Instruction Set Manual, Volume II: - Privileged Architecture}, - note = {Document Version 20190608-Priv-MSU-Ratified}, - publisher = {RISC-V Foundation}, - url = {https://riscv.org/specifications/}, - month = {June}, - year = 2019 -} - -@Proceedings{ _WeKaKr:16, - editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher - Kruegel and Andrew C. Myers and Shai Halevi}, - title = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on - Computer and Communications Security, Vienna, Austria, - October 24-28, 2016}, - publisher = {{ACM}}, - url = {http://dl.acm.org/citation.cfm?id=2976749}, - isbn = {978-1-4503-4139-4}, - year = {2016} + author = {Meltem S\"onmez Turan and Elaine Barker and John Kelsey and + Kerry A. McKay and Mary L. Baish and Mike Boyle}, + title = {Recommendation for the Entropy Sources Used for Random Bit + Generation}, + howpublished = {NIST Special Publication SP 800-90B}, + doi = {10.6028/NIST.SP.800-90B}, + month = {January}, + year = {2018} +} + +@InProceedings{ VaDr10, + author = {Michal Varchola and Milos Drutarovsk{\'{y}}}, + title = {New High Entropy Element for {FPGA} Based True Random + Number Generators}, + booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, + 12th International Workshop, Santa Barbara, CA, USA, August + 17-20, 2010. Proceedings}, + pages = {351--365}, + crossref = {_MaSt10}, + doi = {10.1007/978-3-642-15031-9\_24}, + year = {2010} +} + +@InProceedings{ VaFiAu:10, + author = {Boyan Valtchanov and Viktor Fischer and Alain Aubert and + Florent Bernard}, + title = {Characterization of randomness sources in ring + oscillator-based true random number generators in FPGAs}, + booktitle = {13th {IEEE} International Symposium on Design and + Diagnostics of Electronic Circuits and Systems, {DDECS} + 2010, Vienna, Austria, April 14-16, 2010}, + pages = {48--53}, + crossref = {_GrKoSt:10}, + doi = {10.1109/DDECS.2010.5491819}, + year = {2010} +} + +@Proceedings{ _CaIs20, + editor = {Anne Canteaut and Yuval Ishai}, + title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual + International Conference on the Theory and Applications of + Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, + Proceedings, Part {II}}, + series = {Lecture Notes in Computer Science}, + volume = {12106}, + publisher = {Springer}, + doi = {10.1007/978-3-030-45724-2}, + isbn = {978-3-030-45723-5}, + year = {2020} +} + +@Proceedings{ _ClGa09, + editor = {Christophe Clavier and Kris Gaj}, + title = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, + 11th International Workshop, Lausanne, Switzerland, + September 6-9, 2009, Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {5747}, + publisher = {Springer}, + doi = {10.1007/978-3-642-04138-9}, + isbn = {978-3-642-04137-2}, + year = {2009} +} + +@Proceedings{ _GrKoSt:10, + editor = {Elena Gramatov{\'{a}} and Zdenek Kot{\'{a}}sek and Andreas + Steininger and Heinrich Theodor Vierhaus and Horst + Zimmermann}, + title = {13th {IEEE} International Symposium on Design and + Diagnostics of Electronic Circuits and Systems, {DDECS} + 2010, Vienna, Austria, April 14-16, 2010}, + publisher = {{IEEE} Computer Society}, + url = {https://ieeexplore.ieee.org/xpl/conhome/5484099/proceeding}, + isbn = {978-1-4244-6612-2}, + year = {2010} +} + +@Proceedings{ _MaSt10, + editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, + title = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, + 12th International Workshop, Santa Barbara, CA, USA, August + 17-20, 2010. Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {6225}, + publisher = {Springer}, + doi = {10.1007/978-3-642-15031-9}, + isbn = {978-3-642-15030-2}, + year = {2010} +} + +@Proceedings{ _Ny08, + editor = {Kaisa Nyberg}, + title = {Fast Software Encryption, 15th International Workshop, + {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, + Revised Selected Papers}, + series = {Lecture Notes in Computer Science}, + volume = {5086}, + publisher = {Springer}, + doi = {10.1007/978-3-540-71039-4}, + isbn = {978-3-540-71038-7}, + year = {2008} +} + +@Proceedings{ _SaCa12, + editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, + title = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual + Cryptology Conference, Santa Barbara, CA, USA, August + 19-23, 2012. Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {7417}, + publisher = {Springer}, + doi = {10.1007/978-3-642-32009-5}, + isbn = {978-3-642-32008-8}, + year = {2012} +} + +@Proceedings{ _Ta16, + editor = {Tsuyoshi Takagi}, + title = {Post-Quantum Cryptography - 7th International Workshop, + PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, + Proceedings}, + series = {Lecture Notes in Computer Science}, + volume = {9606}, + publisher = {Springer}, + doi = {10.1007/978-3-319-29360-8}, + isbn = {978-3-319-29359-2}, + year = {2016} +} + +@Book{ _WaAs19, + editor = {Andrew Waterman and Krste Asanovi\'c}, + title = {The {RISC}-{V} Instruction Set Manual, Volume I: + User-Level {ISA}}, + note = {Document Version 20191213}, + publisher = {RISC-V Foundation}, + url = {https://riscv.org/specifications/}, + month = {December}, + year = 2019 +} + +@Book{ _WaAs19A, + editor = {Andrew Waterman and Krste Asanovi\'c}, + title = {The {RISC}-{V} Instruction Set Manual, Volume II: + Privileged Architecture}, + note = {Document Version 20190608-Priv-MSU-Ratified}, + publisher = {RISC-V Foundation}, + url = {https://riscv.org/specifications/}, + month = {June}, + year = 2019 +} + +@Proceedings{ _WeKaKr:16, + editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher + Kruegel and Andrew C. Myers and Shai Halevi}, + title = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on + Computer and Communications Security, Vienna, Austria, + October 24-28, 2016}, + publisher = {{ACM}}, + url = {http://dl.acm.org/citation.cfm?id=2976749}, + isbn = {978-1-4503-4139-4}, + year = {2016} } @electronic{DEBUG_SPEC, title = {The RISC-V Debug Specification}, @@ -1785,3 +1785,20 @@ pages={109-136} year = {} } ~ +@article{HWASAN, + author = {Kostya Serebryany and + Evgenii Stepanov and + Aleksey Shlyapnikov and + Vlad Tsyrklevich and + Dmitry Vyukov}, + title = {Memory Tagging and how it improves {C/C++} memory safety}, + journal = {CoRR}, + volume = {abs/1802.09517}, + year = {2018}, + url = {http://arxiv.org/abs/1802.09517}, + eprinttype = {arXiv}, + eprint = {1802.09517}, + timestamp = {Mon, 13 Aug 2018 16:46:42 +0200}, + biburl = {https://dblp.org/rec/journals/corr/abs-1802-09517.bib}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} |