Skip to content

Commit

Permalink
Add todo note to cover Jasmin (#216)
Browse files Browse the repository at this point in the history
* Add todo note to cover Jasmin

* Also add link to  https://dl.acm.org/doi/10.1145/3548606.3560689 as suggested by @swarnpriya
  • Loading branch information
kbeyls authored Jan 10, 2024
1 parent a4be28c commit 690e134
Showing 1 changed file with 6 additions and 0 deletions.
6 changes: 6 additions & 0 deletions book.md
Original file line number Diff line number Diff line change
Expand Up @@ -1580,6 +1580,7 @@ b) The instructions used to implement the algorithm are from the subset of
By ensuring that the extension is enabled and only instructions in the subset
are used, data-independent execution time is guaranteed.


At the moment, we do not know of a compiler implementation that actively helps
to guarantee both (a) and (b).

Expand All @@ -1591,6 +1592,11 @@ memory accesses, albeit by potentially needing to change the interface of the
transformed function.[Also discuss the techniques implemented in the
[Constatine compiler](https://github.com/pietroborrello/constantine)
[172]{.issue}]{.todo}
[Also discuss the Jasmin language and compiler
[1](https://members.loria.fr/VLaporte/files/CCS2021_StructuredLeakage.pdf)
[2](https://dl.acm.org/doi/10.1145/3548606.3560689)
[213]{.issue}]{.todo}


A great reference giving practical advice on how to achieve (a), (b) and more
security hardening properties specific for cryptographic kernels is found in
Expand Down

0 comments on commit 690e134

Please sign in to comment.