Logo des Repositoriums
 

They’re not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks

dc.contributor.authorJancar, Jan
dc.contributor.authorFourné, Marcel
dc.contributor.authorDe Almeida Braga, Daniel
dc.contributor.authorSabt, Mohamed
dc.contributor.authorSchwabe, Peter
dc.contributor.authorBarthe, Gilles
dc.contributor.authorFouque, Pierre-Alain
dc.contributor.authorAcar, Yasemin
dc.contributor.editorRabiser, Rick
dc.contributor.editorWimmer, Manuel
dc.contributor.editorGroher, Iris
dc.contributor.editorWortmann, Andreas
dc.contributor.editorWiesmayr, Bianca
dc.date.accessioned2024-02-19T09:22:50Z
dc.date.available2024-02-19T09:22:50Z
dc.date.issued2024
dc.identifier.doi10.18420/sw2024_47
dc.identifier.isbn978-3-88579-737-1
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/43592
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSoftware Engineering 2024 (SE 2024)
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-343
dc.titleThey’re not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacksen
dc.typeText/Conference Paper
gi.citation.endPage144
gi.citation.publisherPlaceBonn
gi.citation.startPage143
gi.conference.date26. Februar-1. März 2024
gi.conference.locationLinz, Österreich
gi.conference.sessiontitleSecurity

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
security3.pdf
Größe:
156.4 KB
Format:
Adobe Portable Document Format