diff options
author | jaseg <git-bigdata-wsl-arch@jaseg.de> | 2021-04-13 15:13:34 +0200 |
---|---|---|
committer | jaseg <git-bigdata-wsl-arch@jaseg.de> | 2021-04-13 15:13:34 +0200 |
commit | 5e0be7687ec517fb19ff24c4b59f972b80d3f0de (patch) | |
tree | b0a8a058260cb97c26e656d1a5d9b243b9152fa8 | |
parent | 870521e698f42a626844e2f5cbeab37a3eeeab4a (diff) | |
download | ihsm-5e0be7687ec517fb19ff24c4b59f972b80d3f0de.tar.gz ihsm-5e0be7687ec517fb19ff24c4b59f972b80d3f0de.tar.bz2 ihsm-5e0be7687ec517fb19ff24c4b59f972b80d3f0de.zip |
Censor author-identifying info for double-blind peer review
-rwxr-xr-x | paper/iacrtrans.cls | 1 | ||||
-rw-r--r-- | paper/rotohsm_paper.tex | 15 |
2 files changed, 13 insertions, 3 deletions
diff --git a/paper/iacrtrans.cls b/paper/iacrtrans.cls index bf42a75..45eb9de 100755 --- a/paper/iacrtrans.cls +++ b/paper/iacrtrans.cls @@ -417,6 +417,7 @@ \if@submission \RequirePackage[mathlines]{lineno} +\RequirePackage{xcolor} \linenumbers \def\linenumberfont{\normalfont\tiny\sffamily\color{gray}} diff --git a/paper/rotohsm_paper.tex b/paper/rotohsm_paper.tex index 8c24274..a09fd3a 100644 --- a/paper/rotohsm_paper.tex +++ b/paper/rotohsm_paper.tex @@ -1,4 +1,4 @@ -\documentclass[nohyperref]{iacrtrans} +\documentclass[nohyperref,submission]{iacrtrans} \usepackage[T1]{fontenc} \usepackage[ backend=biber, @@ -13,6 +13,15 @@ \usepackage{eurosym} \usepackage{wasysym} \usepackage{amsthm} +\usepackage{censor} + +\makeatletter +\@ifclasswith{iacrtrans}{submission}{ + \newcommand{\censorIfSubmission}[1]{\censor{#1}{\scriptsize[Author information removed for double-blind peer review]}} +}{ + \newcommand{\censorIfSubmission}[1]{#1} +} +\makeatother \usepackage[binary-units]{siunitx} \DeclareSIUnit{\baud}{Bd} @@ -508,7 +517,7 @@ part of the system once per revolution, so we designed the longituninal PCBs as Our proof-of-concept security mesh covers a total of five interlocking mesh PCBs (Figure~\ref{mesh_gen_sample}). A sixth PCB contains the monitoring circuit and connects to these mesh PCBs. To speed up design iterations, we automated the generation of this security mesh through a plugin for the KiCAD EDA -suite\footnote{\url{https://blog.jaseg.de/posts/kicad-mesh-plugin/}}. Figure~\ref{mesh_gen_viz} visualizes the mesh +suite\footnote{\censorIfSubmission{\url{https://blog.jaseg.de/posts/kicad-mesh-plugin/}}}. Figure~\ref{mesh_gen_viz} visualizes the mesh generation process. First, the target area is overlaid with a grid. Then, the algorithm produces a randomized tree covering the grid. Finally, individual mesh traces are traced according to a depth-first search through this tree. We consider the quality of the plugin's output sufficient for practical applications. Together with FreeCAD's KiCAD @@ -737,6 +746,6 @@ secure hardware. \center{This is version \texttt{\input{version.tex}\unskip} of this paper, generated on \today. The git repository can be found at:} - \center{\url{https://git.jaseg.de/rotohsm.git}} + \center{\censorIfSubmission{\url{https://git.jaseg.de/rotohsm.git}}} } \end{document} |