"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks.
Jan JancarMarcel FournéDaniel De Almeida BragaMohamed SabtPeter SchwabeGilles BarthePierre-Alain FouqueYasemin AcarPublished in: IEEE Symposium on Security and Privacy (2022)
Keyphrases
- security protocols
- differential power analysis
- cryptographic protocols
- cryptographic algorithms
- smart card
- countermeasures
- open source
- power analysis
- security mechanisms
- stream cipher
- security properties
- source code
- end users
- software systems
- software development
- block cipher
- traffic analysis
- secure communication
- malicious attacks
- terrorist attacks
- code snippets
- database systems
- digital images
- software components
- encryption key