Sciweavers

318 search results - page 9 / 64
» How to Leak a Secret
Sort
View
FSTTCS
2007
Springer
14 years 1 months ago
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables that hold secret data to variables that hold public data. In this work we...
Judicaël Courant, Cristian Ene, Yassine Lakhn...
ADAEUROPE
2003
Springer
14 years 26 days ago
Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada
This article discusses the tools that Ada offers to deal with dynamic memory problems. The article shows how the storage pools mechanism of Ada 95 can be extended to enpower devel...
Emmanuel Briot, Franco Gasperoni, Robert Dewar, Di...
CHES
2004
Springer
126views Cryptology» more  CHES 2004»
14 years 1 months ago
Leak Resistant Arithmetic
In this paper we show how the usage of Residue Number Systems (RNS) can easily be turned into a natural defense against many side-channel attacks (SCA). We introduce a Leak Resista...
Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Li...
CCGRID
2005
IEEE
14 years 1 months ago
Secret sequence comparison on public grid computing resources
Once a new gene has been sequenced, it must be verified whether or not it is similar to previously sequenced genes. In many cases, the organization that sequenced a potentially n...
Ken-ichi Kurata, Hiroshi Nakamura, Vincent Breton
CORR
2008
Springer
85views Education» more  CORR 2008»
13 years 7 months ago
Quantifying Timing Leaks and Cost Optimisation
We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...