Can code polymorphism limit information leakage?

    Lecture Notes in Computer Science, Volume 2011, 2011, Pages 1-21.

    Cited by: 10|Bibtex|Views2|Links
    EI
    Keywords:
    side channel attackexecuted code ffunctional languagecryptography silentlyprotected code code fiMore(5+)

    Abstract:

    In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different physical side-channels. It is a known fact that information leakage is a function of both th...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments