You are looking at a specific version 20050613:065028 of this paper. See the latest version.

Paper 2005/174

On the Automatic Construction of Indistinguishable Operations

Manuel Barbosa and Dan Page

Abstract

An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel attack. One well studied methodology for defending against such attacks is the concept of indistinguishable functions which leak no information about program control flow since all execution paths are computationally identical. However, the constructing such functions by hand is laborious and error prone as their complexity increases. We investigate techniques for automating this process and find that effective solutions can be constructed with only minor amounts of computational effort.

Metadata
Available format(s)
PDF PS
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
Side-channel cryptanalysisCountermeasuresSimple Power Analysis
Contact author(s)
mbb @ di uminho pt
History
2005-06-13: received
Short URL
https://ia.cr/2005/174
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.