Results 1 to 10 of about 336,808 (204)
A Constant-time AVX2 Implementation of a Variant of ROLLO
This paper introduces a key encapsulation mechanism ROLLO+ and presents a constant-time AVX2 implementation of it. ROLLO+ is a variant of ROLLO-I targeting IND-CPA security. The main difference between ROLLO+ and ROLLO-I is that the decoding algorithm of
Tung Chou, Jin-Han Liou
doaj +3 more sources
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC [PDF]
We provide further evidence that implementing software countermeasures against timing attacks is a non-trivial task and requires domain-specific software development processes: we report an implementation bug in the s2n library, recently released by AWS ...
Almeida, José Bacelar +3 more
core +5 more sources
Verifying constant-time implementations [PDF]
The constant-time programming discipline is an effective countermeasure against timing attacks, which can lead to complete breaks of otherwise secure systems.
Almeida, José Bacelar +4 more
core +2 more sources
Comparing computational times for simulations when using PBPK model template and stand-alone implementations of PBPK models [PDF]
IntroductionWe previously developed a PBPK model template that consists of a single model “superstructure” with equations and logic found in many physiologically based pharmacokinetic (PBPK) models.
Amanda S. Bernstein +3 more
doaj +2 more sources
Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compact in algebraic
Lorenzo Grassi +5 more
doaj +2 more sources
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4
BIKE is a key encapsulation mechanism that entered the third round of the NIST post-quantum cryptography standardization process. This paper presents two constant-time implementations for BIKE, one tailored for the Intel Haswell and one tailored for the ...
Ming-Shing Chen +2 more
doaj +1 more source
Classic McEliece on the ARM Cortex-M4
This paper presents a constant-time implementation of Classic McEliece for ARM Cortex-M4. Specifically, our target platform is stm32f4-Discovery, a development board on which the amount of SRAM is not even large enough to hold the public key of the ...
Ming-Shing Chen, Tung Chou
doaj +1 more source
Efficient Implementation of SPEEDY Block Cipher on Cortex-M3 and RISC-V Microcontrollers
The SPEEDY block cipher family announced at the CHES 2021 shows excellent performance on hardware architectures. Due to the nature of the hardware-friendly design of SPEEDY, the algorithm has low performance for software implementations. In particular, 6-
Hyunjun Kim +3 more
doaj +1 more source
Exploiting ROLLO’s constant-time implementations with a single-trace analysis
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cheriere, Agathe +3 more
openaire +3 more sources
Verifying constant-time implementations by abstract interpretation [PDF]
Constant-time programming is an established discipline to secure programs against timing attackers. Several real-world secure C libraries such as NaCl, mbedTLS, or Open Quantum Safe, follow this discipline. We propose an advanced static analysis, based on state-of-the-art techniques from abstract interpretation, to report time leakage during ...
Blazy, Sandrine +2 more
openaire +3 more sources

