On Wed, Oct 8, 2014 at 7:34 PM, Palmer Cox <palmer...@gmail.com> wrote:

> rust-crypto and timing attacks [...] AES-NI [...] no one has verified that
> LLVM optimizations [...] assembly code [...] build something like
> rust-constanttime
>

Seems like an OK trajectory, but it would be good to verify if data
dependent timings give attackers a useful statistical signal in Rust crypto
applications, even ones where the core is assembly. I am working on a
library for measuring this empirically.

-- 
Tony Arcieri
_______________________________________________
Rust-dev mailing list
Rust-dev@mozilla.org
https://mail.mozilla.org/listinfo/rust-dev

Reply via email to