all InfoSec news
Schnorr protocol in Jasmin
May 25, 2023, 7:12 a.m. |
IACR News www.iacr.org
ePrint Report: Schnorr protocol in Jasmin
Denis Firsov, Tiago Oliveira, Dominique Unruh
We implement the Schnorr proof system in assembler via the Jasmin toolchain, and prove the security (proof-of-knowledge property) and the absence of leakage through timing side-channels of that implementation in EasyCrypt.
In order to do so, we show how leakage-freeness of Jasmin programs can be proven for probabilistic programs (that are not constant-time). We implement and verify algorithms for fast constant-time modular multiplication and exponentiation (using Barrett reduction …
assembler eprint report implementation knowledge order protocol prove report security system
More from www.iacr.org / IACR News
Secure Coded Distributed Computing
1 day, 12 hours ago |
www.iacr.org
Secure Implementation of SRAM PUF for Private Key Generation
1 day, 12 hours ago |
www.iacr.org
Multiple academic teaching positions
2 days, 10 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Cybersecurity Consultant
@ Devoteam | Cité Mahrajène, Tunisia
GTI Manager of Cybersecurity Operations
@ Grant Thornton | Phoenix, AZ, United States
(Senior) Director of Information Governance, Risk, and Compliance
@ SIXT | Munich, Germany
Information System Security Engineer
@ Space Dynamics Laboratory | North Logan, UT
Intelligence Specialist (Threat/DCO) - Level 3
@ Constellation Technologies | Fort Meade, MD
Cybersecurity GRC Specialist (On-site)
@ EnerSys | Reading, PA, US, 19605