---
_id: '65532'
author:
- first_name: Jan
  full_name: Jancar, Jan
  last_name: Jancar
- first_name: Marcel
  full_name: Fourné, Marcel
  last_name: Fourné
- first_name: Daniel De Almeida
  full_name: Braga, Daniel De Almeida
  last_name: Braga
- first_name: Mohamed
  full_name: Sabt, Mohamed
  last_name: Sabt
- first_name: Peter
  full_name: Schwabe, Peter
  last_name: Schwabe
- first_name: Gilles
  full_name: Barthe, Gilles
  last_name: Barthe
- first_name: Pierre-Alain
  full_name: Fouque, Pierre-Alain
  last_name: Fouque
- first_name: Yasemin
  full_name: Acar, Yasemin
  last_name: Acar
citation:
  ama: 'Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”:
    What Cryptographic Library Developers Think About Timing Attacks. In: <i>2022
    IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>'
  apa: 'Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G.,
    Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What
    Cryptographic Library Developers Think About Timing Attacks. <i>2022 IEEE Symposium
    on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp46214.2022.9833713">https://doi.org/10.1109/sp46214.2022.9833713</a>'
  bibtex: '@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022,
    title={“They’re not that hard to mitigate”: What Cryptographic Library Developers
    Think About Timing Attacks}, DOI={<a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>},
    booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt,
    Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar,
    Yasemin}, year={2022} }'
  chicago: 'Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter
    Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That
    Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.”
    In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href="https://doi.org/10.1109/sp46214.2022.9833713">https://doi.org/10.1109/sp46214.2022.9833713</a>.'
  ieee: 'J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks,” 2022, doi: <a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>.'
  mla: 'Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks.” <i>2022 IEEE Symposium on Security
    and Privacy (SP)</i>, IEEE, 2022, doi:<a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>.'
  short: 'J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A.
    Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.'
date_created: 2026-04-30T09:27:16Z
date_updated: 2026-04-30T09:32:44Z
doi: 10.1109/sp46214.2022.9833713
publication: 2022 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: '“They’re not that hard to mitigate”: What Cryptographic Library Developers
  Think About Timing Attacks'
type: conference
user_id: '125442'
year: '2022'
...
