共 73 条
[1]
ABADI M, 2005, ACM T INFORM SYST SE, V5, P340, DOI [DOI 10.1145/1102120.1102165, DOI 10.1145/1609956.1609960]
[2]
Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P225
[3]
Almeida JB, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P53
[4]
Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC
[J].
FAST SOFTWARE ENCRYPTION (FSE 2016),
2016, 9783
:163-184
[5]
[Anonymous], 2018, Spectre mitigations in msvc
[6]
[Anonymous], 2016, ARXIV PREPRINT ARXIV
[7]
[Anonymous], 2014, P 20 INT C TOOLS ALG
[9]
Secure information flow by self-composition
[J].
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2004,
:100-114
[10]
Secure compilation of side-channel countermeasures: the case of cryptographic "constant-time"
[J].
IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018),
2018,
:328-343