Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches

Security verification of masked software implementations of cryptographic algorithms must account for microarchitectural side-effects of CPUs. Leakage contracts were proposed to provide a formal separation between hardware and software verification, ensuring interoperability and end-to-end security...

Full description

Bibliographic Details
Main Authors: Johannes Haring, Vedad Hadži´c, Roderick Bloem
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2024-09-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tches.iacr.org/index.php/TCHES/article/view/11785