Abstract Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device and intermediate values within the …
D Mercadier, PÉ Dagand - Proceedings of the 40th ACM SIGPLAN …, 2019 - dl.acm.org
Cryptographic primitives are subject to diverging imperatives. Functional correctness and auditability pushes for the use of a high-level programming language. Performance and the …
A Braga, R Dahab - Simpósio Brasileiro de Segurança da Informação …, 2015 - sol.sbc.org.br
This paper contributes to broaden the discussion on tools and techniques in cryptographic programming and verification. The paper accomplishes three goals:(i) surveys recent …
We present a compiler for CAO, an imperative DSL for the cryptographic domain. The tool takes high-level cryptographic algorithm specifications and translates them into C …
Web applications are often responsible for sensitive user data, but are exceedingly difficult to secure. On the backend, they lack effective tools to prevent data leakage, meanwhile bugs …
Bitslicing is a technique commonly used in cryptography to implement high-throughput parallel and constant-time symmetric primitives. However, writing, optimizing and protecting …
CAO is a domain-specific imperative language for cryptography, offering a rich mathematical type system and crypto-oriented language constructions. We describe the design and …
Abstract Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device and intermediate values within the …
WebAssembly is the first new programming language to be supported natively by all major Web browsers since JavaScript. It is designed to be a natural low-level compilation target for …