Author of the publication

They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.

, , , , , , , and . Software Engineering, volume P-343 of LNI, page 143-144. Gesellschaft für Informatik e.V., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks., , , , , , , and . Software Engineering, volume P-343 of LNI, page 143-144. Gesellschaft für Informatik e.V., (2024)It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security., , , , and . SP, page 1527-1544. IEEE, (2023)“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)Aggregation of Network Protocol Data Near Its Source., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 482-491. Springer, (2014)Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects., , , , , and . SP, page 1880-1896. IEEE, (2022)"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks., , , , , , , and . SP, page 632-649. IEEE, (2022)Can Verification of Cryptographic Libraries be liberated from the von Neumann Style?. Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2018)A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda., , , and . IEEE Secur. Priv., 21 (6): 59-63 (November 2023)Committed to Trust: A Qualitative Study on Security and Trust in Open Source Software Projects., , , , , and . Software Engineering, volume P-343 of LNI, page 141-142. Gesellschaft für Informatik e.V., (2024)Attack-Test and Verification Systems, steps towards verifiable Anomaly Detection., , and . GI-Jahrestagung, volume P-220 of LNI, page 2213-2224. GI, (2013)