Thanks for all those who gave constructive criticism. The revised article is
available at Cornell's archive: http://arxiv.org/abs/0912.4080
Givon
_
You @ 37.com - The world's easiest free Email address !
_
On Thu, Jul 5, 2012 at 9:17 AM, Martin Paljak wrote:
> On Tue, Jul 3, 2012 at 1:56 AM, Michael Nelson wrote:
>> It also does not matter whether you are using pkcs11 APIs, and whether you
>> are doing key wrap/unwrap, and whether the data is a key. Any secret piece
>> of data encrypted under an
Hello,
On Tue, Jul 3, 2012 at 1:56 AM, Michael Nelson wrote:
> If the target HSM notices that the encrypted blob is corrupted, then it will
> give you an error message. This is a leak of information, but that's life.
> Normally such a covert channel would at most help you to mount a brute for