âTheyâre not that hard to mitigateâ: What Cryptographic Library Developers Think About Timing Attacks.
Jan JancarMarcel FournéDaniel De Almeida BragaMohamed SabtPeter SchwabeGilles BarthePierre-Alain FouqueYasemin AcarPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- security protocols
- differential power analysis
- cryptographic protocols
- cryptographic algorithms
- smart card
- open source
- countermeasures
- java card
- stream cipher
- advanced encryption standard
- end users
- software development
- watermarking scheme
- software systems
- source code
- information systems
- malicious attacks
- security risks
- block cipher
- security threats
- security properties
- key management
- software developers
- s box
- security mechanisms
- encryption scheme
- code snippets