Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. / Ronen, Eyal; Paterson, Kenneth G.; Shamir, Adi.

CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), 2018. p. 1397-1414.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. / Ronen, Eyal; Paterson, Kenneth G.; Shamir, Adi.

CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), 2018. p. 1397-1414.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Ronen, E, Paterson, KG & Shamir, A 2018, Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. in CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), pp. 1397-1414, 25th ACM Conference on Computer and Communications Security, CCS 2018, Toronto, Canada, 15/10/18. https://doi.org/10.1145/3243734.3243775

APA

Ronen, E., Paterson, K. G., & Shamir, A. (2018). Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. In CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1397-1414). Association for Computing Machinery (ACM). https://doi.org/10.1145/3243734.3243775

Vancouver

Ronen E, Paterson KG, Shamir A. Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. In CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM). 2018. p. 1397-1414 https://doi.org/10.1145/3243734.3243775

Author

Ronen, Eyal ; Paterson, Kenneth G. ; Shamir, Adi. / Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), 2018. pp. 1397-1414

BibTeX

@inproceedings{9e7b2d7911914a529125e14cbc22d555,
title = "Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure",
keywords = "Lucky 13 attack, Plaintext recovery, Side-channel cache attacks, TLS",
author = "Eyal Ronen and Paterson, {Kenneth G.} and Adi Shamir",
year = "2018",
month = oct,
day = "8",
doi = "10.1145/3243734.3243775",
language = "English",
pages = "1397--1414",
booktitle = "CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security",
publisher = "Association for Computing Machinery (ACM)",
address = "United States",
note = "25th ACM Conference on Computer and Communications Security, CCS 2018 ; Conference date: 15-10-2018",

}

RIS

TY - GEN

T1 - Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure

AU - Ronen, Eyal

AU - Paterson, Kenneth G.

AU - Shamir, Adi

PY - 2018/10/8

Y1 - 2018/10/8

KW - Lucky 13 attack

KW - Plaintext recovery

KW - Side-channel cache attacks

KW - TLS

UR - http://www.scopus.com/inward/record.url?scp=85056873306&partnerID=8YFLogxK

UR - https://eprint.iacr.org/2018/747

U2 - 10.1145/3243734.3243775

DO - 10.1145/3243734.3243775

M3 - Conference contribution

AN - SCOPUS:85056873306

SP - 1397

EP - 1414

BT - CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security

PB - Association for Computing Machinery (ACM)

T2 - 25th ACM Conference on Computer and Communications Security, CCS 2018

Y2 - 15 October 2018

ER -