
Daniel De Almeida Braga
@faulst
PhD student in applied cryptography in the SPICY team (former @EMSEC35) at IRISA Laboratory in Rennes.
[email protected]
ID: 1027882404529229824
https://people.irisa.fr/Daniel.De_Almeida_Braga/ 10-08-2018 11:40:37
28 Tweet
44 Followers
66 Following


Join me on August 15, 2021 for the 4th IACR Workshop on Attacks on Cryptography (WAC4): crypto.iacr.org/2021/wac.php Lots of exciting talks by @ic0nz1 Daniel De Almeida Braga Mathy Vanhoef #JuliaLen Elie Bursztein Luca Wilke @PPessl Omer Shlomovits Victor LOMNE IACR #CryptoNews


Workshop on Attacks on Cryptography (WAC4) is about to start, crypto.iacr.org/2021/wac.php Session I, "Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)" @ic0nz1 and "PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild" Daniel De Almeida Braga


What do cryptographic library developers think about timing attacks? We asked and got responses from 44 in our IEEE S&P 2022 paper co-authored with Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Foque and Yasemin Acar. is.muni.cz/go/d54huq 1/4

If you'are IEEE S&P, don't miss the presentation of our work "They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks. A joint work with Ján Jančár, M. Fourné, Daniel De Almeida Braga, M. Sabt, Peter Schwabe, G. Barthe, PA Fouque and Yasemin Acar


I've just presented our work "Exploring Widevine for Fun and Profit" this morning at USENIX WOOT Conference on Offensive Technologies! Thanks again to Martina Lindorfer and Colin O'Flynn for the organization paper: arxiv.org/abs/2204.09298











I am happy to announce that Collide+Power, our new and generic software-based power side-channel technique, has been accepted at USENIX Security 2023 #usesec23. collidepower.com
