From post

They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.

, , , , , , , и . Software Engineering, том P-343 из LNI, стр. 143-144. Gesellschaft für Informatik e.V., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security., , , , и . SP, стр. 1527-1544. IEEE, (2023)"You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards., , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks., , , , , , , и . Software Engineering, том P-343 из LNI, стр. 143-144. Gesellschaft für Informatik e.V., (2024)"These results must be false": A usability evaluation of constant-time analysis tools., , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)Aggregation of Network Protocol Data Near Its Source., , , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 482-491. Springer, (2014)Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects., , , , , и . SP, стр. 1880-1896. IEEE, (2022)"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks., , , , , , , и . SP, стр. 632-649. IEEE, (2022)Can Verification of Cryptographic Libraries be liberated from the von Neumann Style?. Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2018)Attack-Test and Verification Systems, steps towards verifiable Anomaly Detection., , и . GI-Jahrestagung, том P-220 из LNI, стр. 2213-2224. GI, (2013)Committed to Trust: A Qualitative Study on Security and Trust in Open Source Software Projects., , , , , и . Software Engineering, том P-343 из LNI, стр. 141-142. Gesellschaft für Informatik e.V., (2024)