summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjaseg <git-bigdata-wsl-arch@jaseg.de>2021-04-13 15:13:34 +0200
committerjaseg <git-bigdata-wsl-arch@jaseg.de>2021-04-13 15:13:34 +0200
commit5e0be7687ec517fb19ff24c4b59f972b80d3f0de (patch)
treeb0a8a058260cb97c26e656d1a5d9b243b9152fa8
parent870521e698f42a626844e2f5cbeab37a3eeeab4a (diff)
downloadihsm-5e0be7687ec517fb19ff24c4b59f972b80d3f0de.tar.gz
ihsm-5e0be7687ec517fb19ff24c4b59f972b80d3f0de.tar.bz2
ihsm-5e0be7687ec517fb19ff24c4b59f972b80d3f0de.zip
Censor author-identifying info for double-blind peer review
-rwxr-xr-xpaper/iacrtrans.cls1
-rw-r--r--paper/rotohsm_paper.tex15
2 files changed, 13 insertions, 3 deletions
diff --git a/paper/iacrtrans.cls b/paper/iacrtrans.cls
index bf42a75..45eb9de 100755
--- a/paper/iacrtrans.cls
+++ b/paper/iacrtrans.cls
@@ -417,6 +417,7 @@
\if@submission
\RequirePackage[mathlines]{lineno}
+\RequirePackage{xcolor}
\linenumbers
\def\linenumberfont{\normalfont\tiny\sffamily\color{gray}}
diff --git a/paper/rotohsm_paper.tex b/paper/rotohsm_paper.tex
index 8c24274..a09fd3a 100644
--- a/paper/rotohsm_paper.tex
+++ b/paper/rotohsm_paper.tex
@@ -1,4 +1,4 @@
-\documentclass[nohyperref]{iacrtrans}
+\documentclass[nohyperref,submission]{iacrtrans}
\usepackage[T1]{fontenc}
\usepackage[
backend=biber,
@@ -13,6 +13,15 @@
\usepackage{eurosym}
\usepackage{wasysym}
\usepackage{amsthm}
+\usepackage{censor}
+
+\makeatletter
+\@ifclasswith{iacrtrans}{submission}{
+ \newcommand{\censorIfSubmission}[1]{\censor{#1}{\scriptsize[Author information removed for double-blind peer review]}}
+}{
+ \newcommand{\censorIfSubmission}[1]{#1}
+}
+\makeatother
\usepackage[binary-units]{siunitx}
\DeclareSIUnit{\baud}{Bd}
@@ -508,7 +517,7 @@ part of the system once per revolution, so we designed the longituninal PCBs as
Our proof-of-concept security mesh covers a total of five interlocking mesh PCBs (Figure~\ref{mesh_gen_sample}). A sixth
PCB contains the monitoring circuit and connects to these mesh PCBs. To speed up design iterations, we automated the
generation of this security mesh through a plugin for the KiCAD EDA
-suite\footnote{\url{https://blog.jaseg.de/posts/kicad-mesh-plugin/}}. Figure~\ref{mesh_gen_viz} visualizes the mesh
+suite\footnote{\censorIfSubmission{\url{https://blog.jaseg.de/posts/kicad-mesh-plugin/}}}. Figure~\ref{mesh_gen_viz} visualizes the mesh
generation process. First, the target area is overlaid with a grid. Then, the algorithm produces a randomized tree
covering the grid. Finally, individual mesh traces are traced according to a depth-first search through this tree.
We consider the quality of the plugin's output sufficient for practical applications. Together with FreeCAD's KiCAD
@@ -737,6 +746,6 @@ secure hardware.
\center{This is version \texttt{\input{version.tex}\unskip} of this paper, generated on \today. The git repository
can be found at:}
- \center{\url{https://git.jaseg.de/rotohsm.git}}
+ \center{\censorIfSubmission{\url{https://git.jaseg.de/rotohsm.git}}}
}
\end{document}