Главная
Study mode:
on
1
Introduction
2
The Big Four
3
The Problem
4
The Approach
5
What is Constant Time
6
Speculative Execution Semantics
7
Verification
8
Extensions
9
Performance
10
Developer Verification
11
Conclusion
Description:
Explore the critical intersection of cryptography and cybersecurity in the age of Spectre vulnerabilities through this 15-minute IEEE presentation. Delve into the challenges posed by speculative execution attacks, understand the concept of constant-time programming, and learn about innovative approaches to high-assurance cryptography. Discover verification techniques, performance considerations, and developer tools designed to enhance cryptographic implementations' resilience against side-channel attacks. Gain valuable insights into securing modern cryptographic systems in an era of evolving hardware vulnerabilities.

High-Assurance Cryptography in the Spectre Era

IEEE
Add to list
00:00
00:00