Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3423352
|View full text |Cite
|
Sign up to set email alerts
|

HACLxN: Verified Generic SIMD Crypto (for all your favourite platforms)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…A set of distinguished types, combinators and libraries provides users with workingtools to operate on mutable arrays, machine integers, const pointers, and so on. Low* has been used for cryptographic libraries [26], [30], providers [15], protocol record layers [31], [32] and parsers [14].…”
Section: Implementing a Noise Compiler In Low*mentioning
confidence: 99%
“…A set of distinguished types, combinators and libraries provides users with workingtools to operate on mutable arrays, machine integers, const pointers, and so on. Low* has been used for cryptographic libraries [26], [30], providers [15], protocol record layers [31], [32] and parsers [14].…”
Section: Implementing a Noise Compiler In Low*mentioning
confidence: 99%
“…High-assurance cryptography. Many tools have been used to verify functional correctness (and memory safety, if applicable) [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38] and constant-time [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [35], [49] for cryptographic code, including for ChaCha20/Poly1305 [35], [36], [50], [51], [52], [8], [9], [53], [11]. We refer readers to the survey by Barbosa et al [1] for a detailed systematization of high-assurance cryptography tools and applications.…”
Section: Spectre-pht (Input Validation Bypassmentioning
confidence: 99%
“…We will discuss the verification and compilation methodology used by HACL* to generate portable C code for each cryptographic algorithm [5]. We will see how this methodology can be extended to generate verified C code optimized for singleinstruction-multiple-data (SIMD) architectures [3]. We will also show how verified C code from HACL* can be safely composed with verified assembly code for improved performance [4].…”
Section: Karthikeyan Bhargavanmentioning
confidence: 99%