On 5/9/15, Krisztián Pintér <pinte...@gmail.com> wrote:
> ...
> there is another option, using a random permutation on the memory
> addresses. a permutation destroys all information except equality
> (accessing the same address twice). however, you need to apply the
> same permutation to the initial writing phase, which leaks information
> about the permutation itself. again, it provides some protection, but
> not all, and comes with some extra cost.

thank you Krisztián,
 application of a permutation itself leaking information highlights
the problem with counter-measures leaking sensitive information. (and
in turn the side-channel "solution" not an easy fix after all...)

best regards,
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to