AbstractWith today’s dissemination of embedded systems manipulating sensitive data, it has become important to equip low-level programs with strong security guarantees. Unfortunately, security proofs as done by cryptographers are about algorithms, not about concrete implementations running on hardware. In this article, we show how to perform security proofs to guarantee the security of assembly language implementations of cryptographic primitives. Our approach is based on a framework in the Coq proof assistant that integrates correctness proofs of assembly programs with game-playing proofs of provable security. We demonstrate the usability of our approach using the Blum–Blum–Shub pseudorandom number generator, for which an MIPS implementati...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...
We present a methodology for generating a characterization of the memory used by an assembly program...
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a func...
With today's dissemination of embedded systems manipulating sensitive data, it has become important ...
AbstractWith today’s dissemination of embedded systems manipulating sensitive data, it has become im...
In his keynote speech at CHES 2004, Kocher advocated that side-channel attacks were an illustration ...
International audienceIn his keynote speech at CHES 2004, Kocher advocated that side-channel attacks...
CertiCrypt is a framework that enables the machine-checked construction and verification of cryptogr...
Most software domains rely on compilers to translate high-level code to multiple different machine l...
In this paper we consider the verification and certification of computations that are done remotely....
Protecting the confidentiality of information manipulated by a computing system is one of the most i...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Mechanized reasoning about programming languages and type sys-tems is becoming increasingly importan...
In this paper, we present an infrastructure for securing distributed computations between hosts, usi...
International audienceWe develop a new approach for building cryptographic implementations. Our appr...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...
We present a methodology for generating a characterization of the memory used by an assembly program...
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a func...
With today's dissemination of embedded systems manipulating sensitive data, it has become important ...
AbstractWith today’s dissemination of embedded systems manipulating sensitive data, it has become im...
In his keynote speech at CHES 2004, Kocher advocated that side-channel attacks were an illustration ...
International audienceIn his keynote speech at CHES 2004, Kocher advocated that side-channel attacks...
CertiCrypt is a framework that enables the machine-checked construction and verification of cryptogr...
Most software domains rely on compilers to translate high-level code to multiple different machine l...
In this paper we consider the verification and certification of computations that are done remotely....
Protecting the confidentiality of information manipulated by a computing system is one of the most i...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Mechanized reasoning about programming languages and type sys-tems is becoming increasingly importan...
In this paper, we present an infrastructure for securing distributed computations between hosts, usi...
International audienceWe develop a new approach for building cryptographic implementations. Our appr...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...
We present a methodology for generating a characterization of the memory used by an assembly program...
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a func...