Cited By
View all- Fourné MBraga DJancar JSabt MSchwabe PBarthe GFouque PAcar YBalzarotti DXu W(2024)"These results must be false"Proceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699275(6705-6722)Online publication date: 14-Aug-2024
- Cai LSong FChen T(2024)Towards Efficient Verification of Constant-Time Cryptographic ImplementationsProceedings of the ACM on Software Engineering10.1145/36437721:FSE(1019-1042)Online publication date: 12-Jul-2024
- Geimer AVergnolle MRecoules FDaniel LBardin SMaurice CMeng WJensen CCremers CKirda E(2023)A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic LibrariesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623112(1690-1704)Online publication date: 15-Nov-2023