Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899288
Recommendations
- Synthesis of masking countermeasures against side channel attacks
- Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level
- Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software
- Predicting Secret Keys Via Branch Prediction
- \textsc{SCInfer}: refinement-based verification of software countermeasures against side-channel attacks
Cited in
(16)- Formal verification of side-channel countermeasures using self-composition
- Validation of abstract side-channel models for computer architectures
- Graded Hoare logic and its categorical semantics
- Output-sensitive information flow analysis
- Detecting similar code segments through side channel leakage in microcontrollers
- Information-flow control on ARM and POWER multicore processors
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Output-sensitive information flow analysis
- Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
- Is Your Software on Dope?
- Certified compilation for cryptography: extended x86 instructions and constant-time verification
- Stack-aware hyperproperties
- Cryptography and Coding
- A low-cost memory remapping scheme for address bus protection
- Value-dependent information-flow security on weak memory models
This page was built for publication: Information Security and Cryptology - ICISC 2005
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899288)