Can code polymorphism limit information leakage?
Lecture Notes in Computer Science, Volume 2011, 2011, Pages 1-21.
side channel attackexecuted code ffunctional languagecryptography silentlyprotected code code fiMore(5+)
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different physical side-channels. It is a known fact that information leakage is a function of both th...More
Full Text (Upload PDF)
PPT (Upload PPT)