Results 1 to 10 of about 336,920 (287)

A Constant-time AVX2 Implementation of a Variant of ROLLO

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems, 2021
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of ROLLO+ is adapted from the decoding algorithm of ROLLO-I.
Tung Chou, Jin-Han Liou
openaire   +4 more sources

Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC [PDF]

open access: yes, 2016
We provide further evidence that implementing software countermeasures against timing attacks is a non-trivial task and requires domain-specific software development processes: we report an implementation bug in the s2n library, recently released by AWS Labs.
Almeida, José Bacelar   +3 more
openaire   +6 more sources

Exploiting ROLLO’s constant-time implementations with a single-trace analysis

open access: yesDesigns, Codes and Cryptography, 2023
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cheriere, Agathe   +3 more
openaire   +3 more sources

Verifying constant-time implementations by abstract interpretation [PDF]

open access: yesJournal of Computer Security, 2017
Constant-time programming is an established discipline to secure programs against timing attackers. Several real-world secure C libraries such as NaCl, mbedTLS, or Open Quantum Safe, follow this discipline. We propose an advanced static analysis, based on state-of-the-art techniques from abstract interpretation, to report time leakage during ...
Blazy, Sandrine   +2 more
openaire   +3 more sources

MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations [PDF]

open access: yesInternational Journal of Parallel Programming, 2018
Cache attacks exploit memory access patterns of cryptographic implementations. Constant-Time implementation techniques have become an indispensable tool in fighting cache timing attacks. These techniques engineer the memory accesses of cryptographic operations to follow a uniform key independent pattern. However, the constant-time behavior is dependent
Ahmad Moghimi   +3 more
openaire   +2 more sources

Efficient Hardware Implementation of Constant Time Sampling for HQC

open access: yes, 2023
HQC is one of the code-based finalists in the last round of the NIST post quantum cryptography standardization process. In this process, security and implementation efficiency are key metrics for the selection of the candidates. A critical compute kernel with respect to efficient hardware implementations and security in HQC is the sampling method used ...
Schöffel, Maximilian   +2 more
openaire   +2 more sources

Constant-time addition with hybrid-redundant numbers: Theory and implementations [PDF]

open access: yesIntegration, 2008
Hybrid-redundant number representation has provided a flexible framework for digit-parallel addition in a manner that facilitates area-time tradeoffs for VLSI implementations via arbitrary spacing of redundant digit positions within an otherwise nonredundant representation.
Ghassem Jaberipur, Behrooz Parhami
openaire   +1 more source

Using e-mail as performance feedback to teach paraprofessionals to implement constant time delay with braille words [PDF]

open access: yesBritish Journal of Visual Impairment, 2021
Equipping paraprofessionals to implement evidence-based instructional practices with fidelity can enhance the education of students with visual impairments. We used a multiple probe across participants design to evaluate the ability of paraprofessionals to follow constant time delay procedures with high fidelity when teaching braille words.
Carlie R. Rhoads, Erik W. Carter
openaire   +1 more source

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

open access: yesProceedings of the 17th International Conference on Availability, Reliability and Security, 2022
23 pages, 4 Figures, 7 ...
Marzougui, Soundes   +4 more
openaire   +3 more sources

Breaking Bad: How Compilers Break Constant-Time Implementations

open access: yesProceedings of the 20th ACM Asia Conference on Computer and Communications Security
The implementations of most hardened cryptographic libraries use defensive programming techniques for side-channel resistance. These techniques are usually specified as guidelines to developers on specific code patterns to use or avoid. Examples include performing arithmetic operations to choose between two variables instead of executing a secret ...
Schneider, Moritz; id_orcid0000-0002-8069-9848   +4 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy