Compositional Synthesis of Leakage Resilient Programs
From MaRDI portal
Publication:3304821
DOI10.1007/978-3-662-54455-6_13zbMath1444.68036arXiv1610.05603OpenAlexW2538823313MaRDI QIDQ3304821
Tachio Terauchi, Arthur Blot, Masaki Yamamoto
Publication date: 3 August 2020
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1610.05603
synthesis algorithmsatisfying assignmentcompositionality propertyprototype implementationpublic input
Uses Software
Cites Work
- Unnamed Item
- Synthesis of Masking Countermeasures against Side Channel Attacks
- Higher-Order Side Channel Security and Mask Refreshing
- Verified Proofs of Higher-Order Masking
- Assessing security threats of looping constructs
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Securing Computation against Continuous Leakage
- Provably Secure Higher-Order Masking of AES
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- On the Foundations of Quantitative Information Flow
- Theory and Practice of a Leakage Resilient Masking Scheme
- Masking against Side-Channel Attacks: A Formal Security Proof
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Compositional Synthesis of Leakage Resilient Programs