Filters








3 Hits in 6.6 sec

Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers [article]

Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
2020 arXiv   pre-print
We use Rosita to automatically protect masked implementations of AES and Xoodoo and show the absence of observable leakage at only a 25% penalty to the performance.  ...  We present Rosita, a code rewrite engine that uses a leakage emulator which we amended to correctly emulate the micro-architecture of a target system.  ...  Basically, the two ciphers used are very different and together make our analysis more comprehensive. As Table I shows, ROSITA successfully eliminates leakage from both AES and Xoodoo.  ... 
arXiv:1912.05183v3 fatcat:dndroxdtbjguxm7oc7jvycauhq

SoK: Design Tools for Side-Channel-Aware Implementations [article]

Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont
2021 arXiv   pre-print
In this SoK, we classify approaches to automated leakage detection based on the model's source of truth.  ...  Traditional approaches for leakage detection measure the physical properties of the device. Hence, they cannot be used during the design process and fail to provide root cause analysis.  ...  ROSITA [73] is a rule-driven code rewrite engine that patches the code automatically once leakage is detected.  ... 
arXiv:2104.08593v2 fatcat:ybvrwhb4xbbdrftfgnmcklo5iu

Tracing cultural un/belonging : the witch in Western feminist theory and literature

Justyna Szachowicz-Sempruch
2003
that is both contested and difficult to displace in contemporary representations of 'woman'.  ...  The aim of this study is to examine selected narrative and theoretical feminist constructs of the 'witch' produced by women in the Western world over the last thirty years.  ...  And where does the devil come in, Rosita?'  ... 
doi:10.14288/1.0091151 fatcat:rz4itkplurcajfmzv5k7rvyd2q