A Constant-time AVX2 Implementation of a Variant of ROLLO
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of ROLLO+ is adapted from the decoding algorithm of ROLLO-I.
Tung Chou, Jin-Han Liou
openaire +4 more sources
Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC [PDF]
We provide further evidence that implementing software countermeasures against timing attacks is a non-trivial task and requires domain-specific software development processes: we report an implementation bug in the s2n library, recently released by AWS Labs.
Almeida, José Bacelar +3 more
openaire +6 more sources
Exploiting ROLLO’s constant-time implementations with a single-trace analysis
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cheriere, Agathe +3 more
openaire +3 more sources
Verifying constant-time implementations by abstract interpretation [PDF]
Constant-time programming is an established discipline to secure programs against timing attackers. Several real-world secure C libraries such as NaCl, mbedTLS, or Open Quantum Safe, follow this discipline. We propose an advanced static analysis, based on state-of-the-art techniques from abstract interpretation, to report time leakage during ...
Blazy, Sandrine +2 more
openaire +3 more sources
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations [PDF]
Cache attacks exploit memory access patterns of cryptographic implementations. Constant-Time implementation techniques have become an indispensable tool in fighting cache timing attacks. These techniques engineer the memory accesses of cryptographic operations to follow a uniform key independent pattern. However, the constant-time behavior is dependent
Ahmad Moghimi +3 more
openaire +2 more sources
Efficient Hardware Implementation of Constant Time Sampling for HQC
HQC is one of the code-based finalists in the last round of the NIST post quantum cryptography standardization process. In this process, security and implementation efficiency are key metrics for the selection of the candidates. A critical compute kernel with respect to efficient hardware implementations and security in HQC is the sampling method used ...
Schöffel, Maximilian +2 more
openaire +2 more sources
Constant-time addition with hybrid-redundant numbers: Theory and implementations [PDF]
Hybrid-redundant number representation has provided a flexible framework for digit-parallel addition in a manner that facilitates area-time tradeoffs for VLSI implementations via arbitrary spacing of redundant digit positions within an otherwise nonredundant representation.
Ghassem Jaberipur, Behrooz Parhami
openaire +1 more source
Using e-mail as performance feedback to teach paraprofessionals to implement constant time delay with braille words [PDF]
Equipping paraprofessionals to implement evidence-based instructional practices with fidelity can enhance the education of students with visual impairments. We used a multiple probe across participants design to evaluate the ability of paraprofessionals to follow constant time delay procedures with high fidelity when teaching braille words.
Carlie R. Rhoads, Erik W. Carter
openaire +1 more source
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS
23 pages, 4 Figures, 7 ...
Marzougui, Soundes +4 more
openaire +3 more sources
Breaking Bad: How Compilers Break Constant-Time Implementations
The implementations of most hardened cryptographic libraries use defensive programming techniques for side-channel resistance. These techniques are usually specified as guidelines to developers on specific code patterns to use or avoid. Examples include performing arithmetic operations to choose between two variables instead of executing a secret ...
Schneider, Moritz; id_orcid0000-0002-8069-9848 +4 more
openaire +4 more sources

