Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. / Ronen, Eyal; Paterson, Kenneth G.; Shamir, Adi.

CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), 2018. p. 1397-1414.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Documents

Original languageEnglish
Title of host publicationCCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery (ACM)
Pages1397-1414
Number of pages18
ISBN (Electronic)9781450356930
DOIs
Publication statusPublished - 8 Oct 2018
Event25th ACM Conference on Computer and Communications Security, CCS 2018 - Toronto, Canada
Duration: 15 Oct 2018 → …

Conference

Conference25th ACM Conference on Computer and Communications Security, CCS 2018
CountryCanada
CityToronto
Period15/10/18 → …
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 32762191