Back to Search
Start Over
Leakage Resilience against Concurrent Cache Attacks.
- Source :
- Principles of Security & Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory & Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings; 2014, p140-158, 19p
- Publication Year :
- 2014
-
Abstract
- In this paper we show how to engineer proofs of security for software implementations of leakage-resilient cryptosystems on execution platforms with concurrency and caches. The proofs we derive are based on binary executables of the cryptosystem and on simple but realistic models of microprocessors. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISBNs :
- 9783642547911
- Database :
- Complementary Index
- Journal :
- Principles of Security & Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory & Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings
- Publication Type :
- Book
- Accession number :
- 95553989
- Full Text :
- https://doi.org/10.1007/978-3-642-54792-8_8