Compiler assisted masking

A Moss, E Oswald, D Page, M Tunstall - Cryptographic Hardware and …, 2012 - Springer
Abstract Differential Power Analysis (DPA) attacks find a statistical correlation between the
power consumption of a cryptographic device and intermediate values within the …

Usuba: high-throughput and constant-time ciphers, by construction

D Mercadier, PÉ Dagand - Proceedings of the 40th ACM SIGPLAN …, 2019 - dl.acm.org
Cryptographic primitives are subject to diverging imperatives. Functional correctness and
auditability pushes for the use of a high-level programming language. Performance and the …

Secure computing with the MPEG RVC framework

JJ Ahmad, S Li, R Thavot, M Mattavelli - Signal Processing: Image …, 2013 - Elsevier
Recently, ISO/IEC standardized a dataflow-programming framework called Reconfigurable
Video Coding (RVC) for the specification of video codecs. The RVC framework aims at …

Ctl: A platform-independent crypto tools library based on dataflow programming paradigm

JJ Ahmad, S Li, AR Sadeghi, T Schneider - Financial Cryptography and …, 2012 - Springer
The diversity of computing platforms is increasing rapidly. In order to allow security
applications to run on such diverse platforms, implementing and optimizing the same …

Automatic insertion of dpa countermeasures

A Moss, E Oswald, D Page, M Tunstall - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Abstract Differential Power Analysis (DPA) attacks find a statistical correlation between the
power consumption of a cryptographic device and intermediate values within the …

Building multimedia security applications in the MPEG Reconfigurable Video Coding (RVC) framework

JJ Ahmad, S Li, I Amer, M Mattavelli - Proceedings of the thirteenth ACM …, 2011 - dl.acm.org
Although used by most of system developers, imperative languages are known for not being
able to provide easily reconfigurable, platform independent and strictly modular …