메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1217-1229

Certified computer-aided cryptography: Efficient provably secure machine code from high-level implementations

Author keywords

certified compilation; formal proof; PKCS 1; side channels

Indexed keywords

ASSEMBLY IMPLEMENTATION; CERTIFIED COMPILATION; CRYPTOGRAPHIC IMPLEMENTATION; CRYPTOGRAPHIC SOFTWARE; FORMAL PROOFS; PKCS#1; RELATIONAL PROPERTIES; SIDE-CHANNELS;

EID: 84889046183     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516652     Document Type: Conference Paper
Times cited : (35)

References (34)
  • 1
    • 84861598516 scopus 로고    scopus 로고
    • Certifying assembly with formal security proofs: The case of BBS
    • Reynald Affeldt, David Nowak, and Kiyoshi Yamada. Certifying assembly with formal security proofs: The case of BBS. Sci. Comput. Program., 77(10-11):1058-1074, 2012.
    • (2012) Sci. Comput. Program. , vol.77 , Issue.10-11 , pp. 1058-1074
    • Affeldt, R.1    Nowak, D.2    Yamada, K.3
  • 2
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • Johan Agat. Transforming out timing leaks. In Proceedings of POPL'00, pages 40-53, 2000.
    • (2000) Proceedings of POPL'00 , pp. 40-53
    • Agat, J.1
  • 3
    • 0034823291 scopus 로고    scopus 로고
    • On con dentiality and algorithms
    • IEEE Computer Society
    • Johan Agat and David Sands. On con dentiality and algorithms. In IEEE Symposium on Security and Privacy, pages 64-77. IEEE Computer Society, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 64-77
    • Agat, J.1    Sands, D.2
  • 6
    • 78149275873 scopus 로고    scopus 로고
    • Survey: Leakage resilience and the bounded retrieval model
    • Kaoru Kurosawa, editor, ICITS, Springer
    • Joël Alwen, Yevgeniy Dodis, and Daniel Wichs. Survey: Leakage resilience and the bounded retrieval model. In Kaoru Kurosawa, editor, ICITS, volume 5973 of Lecture Notes in Computer Science, pages 1-18. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5973 , pp. 1-18
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 7
    • 79953220810 scopus 로고    scopus 로고
    • Verified software toolchain - (Invited talk)
    • ESOP'11, Springer
    • Andrew W. Appel. Verified software toolchain - (invited talk). In ESOP'11, volume 6602 of Lecture Notes in Computer Science, pages 1-17. Springer, 2011.
    • (2011) Lecture Notes in Computer Science , vol.6602 , pp. 1-17
    • Appel, A.W.1
  • 8
    • 84889000914 scopus 로고    scopus 로고
    • Deliverable 5.4: Certified shared library core
    • Manuel Barbosa, editor. Deliverable 5.4: Certified shared library core. Computer Aided Cryptography Engineering (CACE FP7 EU Project), 2011. http://www.cace-project.eu.
    • (2011) Computer Aided Cryptography Engineering
    • Barbosa, M.1
  • 9
    • 80051978821 scopus 로고    scopus 로고
    • Computer-aided security proofs for the working cryptographer
    • Advances in Cryptology - CRYPTO 2011, Heidelberg, Springer
    • Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, and Santiago Zanella-Béguelin. Computer-aided security proofs for the working cryptographer. In Advances in Cryptology - CRYPTO 2011, volume 6841 of Lecture Notes in Computer Science, pages 71-90, Heidelberg, 2011. Springer.
    • (2011) Lecture Notes in Computer Science , vol.6841 , pp. 71-90
    • Barthe, G.1    Grégoire, B.2    Heraud, S.3    Zanella-Béguelin, S.4
  • 10
    • 79951804314 scopus 로고    scopus 로고
    • Beyond provable security. Verifiable IND-CCA security of OAEP
    • Topics in Cryptology - CT-RSA 2011, Heidelberg, Springer
    • Gilles Barthe, Benjamin Grégoire, Yassine Lakhnech, and Santiago Zanella-Béguelin. Beyond provable security. Verifiable IND-CCA security of OAEP. In Topics in Cryptology - CT-RSA 2011, volume 6558 of Lecture Notes in Computer Science, pages 180-196, Heidelberg, 2011. Springer.
    • (2011) Lecture Notes in Computer Science , vol.6558 , pp. 180-196
    • Barthe, G.1    Grégoire, B.2    Lakhnech, Y.3    Zanella-Béguelin, S.4
  • 11
    • 84866017720 scopus 로고    scopus 로고
    • The security impact of a new cryptographic library
    • Alejandro Hevia and Gregory Neven, editors, Progress in Cryptology - LATINCRYPT 2012, Springer Berlin Heidelberg
    • Daniel J. Bernstein, Tanja Lange, and Peter Schwabe. The security impact of a new cryptographic library. In Alejandro Hevia and Gregory Neven, editors, Progress in Cryptology - LATINCRYPT 2012, volume 7533 of Lecture Notes in Computer Science, pages 159-176. Springer Berlin Heidelberg, 2012.
    • (2012) Lecture Notes in Computer Science , vol.7533 , pp. 159-176
    • Bernstein, D.J.1    Lange, T.2    Schwabe, P.3
  • 13
    • 84859357099 scopus 로고    scopus 로고
    • Security protocol verification: Symbolic and computational models. Pierpaolo Degano and Joshua D. Guttman, editors, Principles of Security and Trust - First International Conference, POST 2012
    • Springer
    • Bruno Blanchet. Security protocol verification: Symbolic and computational models. In Pierpaolo Degano and Joshua D. Guttman, editors, Principles of Security and Trust - First International Conference, POST 2012, volume 7215 of Lecture Notes in Computer Science, pages 3-29. Springer, 2012.
    • (2012) Lecture Notes in Computer Science , vol.7215 , pp. 3-29
    • Blanchet, B.1
  • 15
    • 84857727360 scopus 로고    scopus 로고
    • Practical realisation and elimination of an ECC-related software bug attack
    • Orr Dunkelman, editor, CT-RSA, Springer
    • Billy Bob Brumley, Manuel Barbosa, Dan Page, and Frederik Vercauteren. Practical realisation and elimination of an ECC-related software bug attack. In Orr Dunkelman, editor, CT-RSA, volume 7178 of Lecture Notes in Computer Science, pages 171-186. Springer, 2012.
    • (2012) Lecture Notes in Computer Science , vol.7178 , pp. 171-186
    • Brumley, B.B.1    Barbosa, M.2    Page, D.3    Vercauteren, F.4
  • 16
    • 84874422917 scopus 로고    scopus 로고
    • Proved generation of implementations from computationally secure protocol specifications
    • POST, Springer
    • David Cadé and Bruno Blanchet. Proved generation of implementations from computationally secure protocol specifications. In POST, volume 7796 of Lecture Notes in Computer Science, pages 63-82. Springer, 2013.
    • (2013) Lecture Notes in Computer Science , vol.7796 , pp. 63-82
    • Cadé, D.1    Blanchet, B.2
  • 17
  • 21
    • 84880853825 scopus 로고    scopus 로고
    • RSA-OAEP is secure under the RSA assumption
    • Advances in Cryptology - CRYPTO 2001, Springer
    • Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, and Jacques Stern. RSA-OAEP is secure under the RSA assumption. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 260-274. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 260-274
    • Fujisaki, E.1    Okamoto, T.2    Pointcheval, D.3    Stern, J.4
  • 22
  • 24
    • 84866939599 scopus 로고    scopus 로고
    • A framework for the cryptographic verification of Java-like programs
    • IEEE
    • Ralf Küsters, Tomasz Truderung, and Juergen Graf. A framework for the cryptographic verification of Java-like programs. In CSF, pages 198-212. IEEE, 2012.
    • (2012) CSF , pp. 198-212
    • Küsters, R.1    Truderung, T.2    Graf, J.3
  • 25
  • 27
    • 33846862428 scopus 로고    scopus 로고
    • A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0
    • Advances in Cryptology - CRYPTO 2001, Heidelberg, Springer
    • James Manger. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 230-238, Heidelberg, 2001. Springer.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 230-238
    • Manger, J.1
  • 28
    • 33745813464 scopus 로고    scopus 로고
    • The program counter security model: Automatic detection and removal of control-flow side channel attacks
    • ICISC, Springer
    • David Molnar, Matt Piotrowski, David Schultz, and David Wagner. The program counter security model: Automatic detection and removal of control-flow side channel attacks. In ICISC, volume 3935 of Lecture Notes in Computer Science, pages 156-168. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3935 , pp. 156-168
    • Molnar, D.1    Piotrowski, M.2    Schultz, D.3    Wagner, D.4
  • 29
    • 34748821192 scopus 로고    scopus 로고
    • A verifying core for a cryptographic language compiler
    • ACM
    • Lee Pike, Mark Shields, and John Matthews. A verifying core for a cryptographic language compiler. In ACL2, pages 1-10. ACM, 2006.
    • (2006) ACL2 , pp. 1-10
    • Pike, L.1    Shields, M.2    Matthews, J.3
  • 32
    • 58049175910 scopus 로고    scopus 로고
    • Automatic formal verification of block cipher implementations
    • IEEE
    • Eric Whitman Smith and David L. Dill. Automatic formal verification of block cipher implementations. In FMCAD, pages 1-7. IEEE, 2008.
    • (2008) FMCAD , pp. 1-7
    • Smith, E.W.1    Dill, D.L.2
  • 33
    • 78650853288 scopus 로고    scopus 로고
    • Manger's attack revisited
    • Miguel Soriano, Sihan Qing, and Javier López, editors, Information and Communications Security, Springer Berlin Heidelberg
    • Falko Strenzke. Manger's attack revisited. In Miguel Soriano, Sihan Qing, and Javier López, editors, Information and Communications Security, volume 6476 of Lecture Notes in Computer Science, pages 31-45. Springer Berlin Heidelberg, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6476 , pp. 31-45
    • Strenzke, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.