@inproceedings{amarilli:hal-01110259, TITLE = {{Can code polymorphism limit information leakage?}}, AUTHOR = {Amarilli, Antoine and M{\"u}ller, Sascha and Naccache, David and Page, Daniel and Rauzy, Pablo and Tunstall, Michael}, URL = {https://inria.hal.science/hal-01110259}, NOTE = {Part 1: Keynote Speech}, BOOKTITLE = {{5th Workshop on Information Security Theory and Practices (WISTP)}}, ADDRESS = {Heraklion, Crete, Greece}, EDITOR = {Claudio A. Ardagna and Jianying Zhou}, PUBLISHER = {{Springer}}, SERIES = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication}, VOLUME = {LNCS-6633}, PAGES = {1-21}, YEAR = {2011}, MONTH = Jun, DOI = {10.1007/978-3-642-21040-2\_1}, KEYWORDS = {Program Graph ; Source Program ; Code Size ; Machine Code ; Round Function}, PDF = {https://inria.hal.science/hal-01110259/file/978-3-642-21040-2_1_Chapter.pdf}, HAL_ID = {hal-01110259}, HAL_VERSION = {v1}, }