Ct-wasm: type-driven secure cryptography for the web ecosystem

C Watt, J Renner, N Popescu, S Cauligi… - Proceedings of the ACM …, 2019 - dl.acm.org
A significant amount of both client and server-side cryptography is implemented in
JavaScript. Despite widespread concerns about its security, no other language has been …

Compiler assisted masking

A Moss, E Oswald, D Page, M Tunstall - Cryptographic Hardware and …, 2012 - Springer
Abstract Differential Power Analysis (DPA) attacks find a statistical correlation between the
power consumption of a cryptographic device and intermediate values within the …

Usuba: high-throughput and constant-time ciphers, by construction

D Mercadier, PÉ Dagand - Proceedings of the 40th ACM SIGPLAN …, 2019 - dl.acm.org
Cryptographic primitives are subject to diverging imperatives. Functional correctness and
auditability pushes for the use of a high-level programming language. Performance and the …

A survey on tools and techniques for the programming and verification of secure cryptographic software

A Braga, R Dahab - Simpósio Brasileiro de Segurança da Informação …, 2015 - sol.sbc.org.br
This paper contributes to broaden the discussion on tools and techniques in cryptographic
programming and verification. The paper accomplishes three goals:(i) surveys recent …

Compiling CAO: from cryptographic specifications to C implementations

M Barbosa, D Castro, PF Silva - Principles of Security and Trust: Third …, 2014 - Springer
We present a compiler for CAO, an imperative DSL for the cryptographic domain. The tool
takes high-level cryptographic algorithm specifications and translates them into C …

[图书][B] Language Techniques for Automated Verifiction of Web Security

J Renner - 2022 - search.proquest.com
Web applications are often responsible for sensitive user data, but are exceedingly difficult
to secure. On the backend, they lack effective tools to prevent data leakage, meanwhile bugs …

Usuba, Optimizing Bitslicing Compiler

D Mercadier - 2020 - theses.hal.science
Bitslicing is a technique commonly used in cryptography to implement high-throughput
parallel and constant-time symmetric primitives. However, writing, optimizing and protecting …

CAOVerif: An open-source deductive verification platform for cryptographic software implementations

JB Almeida, M Barbosa, JC Filliâtre, JS Pinto… - Science of Computer …, 2014 - Elsevier
CAO is a domain-specific imperative language for cryptography, offering a rich mathematical
type system and crypto-oriented language constructions. We describe the design and …

Automatic insertion of dpa countermeasures

A Moss, E Oswald, D Page, M Tunstall - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Abstract Differential Power Analysis (DPA) attacks find a statistical correlation between the
power consumption of a cryptographic device and intermediate values within the …

Mechanising and evolving the formal semantics of WebAssembly: the Web's new low-level language

C Watt - 2021 - repository.cam.ac.uk
WebAssembly is the first new programming language to be supported natively by all major
Web browsers since JavaScript. It is designed to be a natural low-level compilation target for …