pith. machine review for the scientific record.
sign in

On the security of public key protocols (extended abstract),

2 Pith papers cite this work. Polarity classification is still indexing.

2 Pith papers citing it

citation-role summary

background 1

citation-polarity summary

fields

cs.CR 2

years

2026 1 2025 1

verdicts

UNVERDICTED 2

roles

background 1

polarities

background 1

representative citing papers

Automated Side-Channel Analysis of Cryptographic Protocol Implementations

cs.CR · 2025-11-14 · unverdicted · novelty 6.0

The authors built an automated toolchain that extracts symbolic models from real binaries of cryptographic protocols and analyzes them for constant-time and speculative side-channel leaks, demonstrated on WhatsApp and e-passport implementations.

citing papers explorer

Showing 2 of 2 citing papers.