On Wed, Oct 8, 2014 at 7:34 PM, Palmer Cox <palmer...@gmail.com> wrote:
> rust-crypto and timing attacks [...] AES-NI [...] no one has verified that > LLVM optimizations [...] assembly code [...] build something like > rust-constanttime > Seems like an OK trajectory, but it would be good to verify if data dependent timings give attackers a useful statistical signal in Rust crypto applications, even ones where the core is assembly. I am working on a library for measuring this empirically. -- Tony Arcieri
_______________________________________________ Rust-dev mailing list Rust-dev@mozilla.org https://mail.mozilla.org/listinfo/rust-dev