Date: Sun, 15 May 2005 02:05:25 -0400 From: Colin Percival <cperciva@freebsd.org> To: Nate Lawson <nate@root.org> Cc: cvs-all@FreeBSD.org Subject: Re: cvs commit: src/sys/amd64/amd64 mp_machdep.csrc/sys/amd64/include cpufunc.h src/sys/i386/i386 mp_machdep.c src/sys/i386/include cpufunc.h Message-ID: <4286E6A5.4030902@freebsd.org> In-Reply-To: <42864809.7020700@root.org> References: <200505130001.j4D01KcE015393@repoman.freebsd.org> <20050514093203.GA81770@FreeBSD.org> <4285C73B.3040409@freebsd.org> <42864809.7020700@root.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Nate Lawson wrote: > That is at best, hyperbole. Have you been talking to Intel lately? > Crypto implementations which properly > implement blinding or operate in constant time are not vulnerable. Crypto implementations which implement blinding are vulnerable. Crypto implementations which operate in constant time would not be vulnerable, but not for the reasons you think, and I don't think any such implementations currently exist. > Disabling HTT only decreases the quality of measurement, requiring more > measurements. No. Read my paper. I'm not measuring the total time needed for an RSA operation; I'm watching it as it occurs. Colin Percival
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4286E6A5.4030902>