Polymorphic Cryptographic Implementations

somdn_product_page

(Downloads - 0)

Catégorie :

For more info about our services contact : help@bestpfe.com

Table of contents

1 Introduction 
1.1 Contributions
1.2 Background
1.3 Conclusion
2 Usuba, Informally 
2.1 Data Layout
2.2 Syntax & Semantics, Informally
2.3 Types
2.4 Applications
2.5 Conclusion
3 Usuba, Greek Edition 
3.1 Syntax
3.2 Type System
3.3 Monomorphization
3.4 Semantics
3.5 Usuba0
3.6 Translation to PseudoC
3.7 Conclusion
4 Usubac 
4.1 Frontend
4.2 Backend
4.3 Conclusion
5 Performance Evaluation 
5.1 Usuba vs. Reference Implementations
5.2 Scalability
5.3 Polymorphic Cryptographic Implementations
5.4 Conclusion
6 Protecting Against Power-based Side-channel Attacks 
6.1 Masking
6.2 Tornado
6.3 Evaluation
6.4 Conclusion
7 Protecting Against Fault Attacks and Power-based Side-channels Attacks 
7.1 Fault Attacks
7.2 SKIVA
7.3 Evaluation
7.4 Conclusion
8 Conclusion 
8.1 Future Work
Bibliography 
Appendix A Backend optimizations

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *