They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.
Jan JancarMarcel FournéDaniel De Almeida BragaMohamed SabtPeter SchwabeGilles BarthePierre-Alain FouqueYasemin AcarPublished in: Software Engineering (2024)
Keyphrases
- security protocols
- differential power analysis
- cryptographic protocols
- countermeasures
- open source
- cryptographic algorithms
- stream cipher
- smart card
- source code
- software development
- malicious attacks
- end users
- hash functions
- advanced encryption standard
- traffic analysis
- block cipher
- java card
- security properties
- s box
- malicious users
- key management
- watermarking scheme
- security threats
- denial of service attacks
- dos attacks
- elliptic curve cryptography
- code snippets
- software projects