Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems significantly more unknown bits can be handled by using Pollard's kangaroo method: if $b$ bits are unknown then the attack runs in $2^{b/2}$ instead of $2^b$. If an attacker has many targets in the same group and thus has reasons to invest in precomputation, the costs can even be brought down to $2^{b/3}$. Usually the separation between known and unknown keybits is not this clear cut -- they are known with probabilities ranging between 100\% and 0\%. Enumera...
Key rank estimation provides a measure of the effort that the attacker has to spend bruteforcing the...
We show how to exploit the encrypted key import functions of a variety of different cryptographic de...
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underly...
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other de...
Methods for enumerating cryptographic keys based on partial information obtained on key bytes are im...
Side channels provide additional information to skilled adversaries that reduce the effort to determ...
Motivated by the need to assess the concrete security of a device after a side channel attack, ther...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Abstract. The kangaroo method computes a discrete logarithm in an arbitrary cyclic group, given that...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
A Eurocrypt 2013 paper "Security evaluations beyond computing power: How to analyze side-channel att...
Present key sizes for symmetric cryptography are usually required to be at least 80-bit long for sho...
Side-channel attacks are powerful techniques to attack implementations of cryptographic algorithms b...
2Direction Générale de l’Armement–Mâıtrise de l’information, France. Abstract. Current key sizes ...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Key rank estimation provides a measure of the effort that the attacker has to spend bruteforcing the...
We show how to exploit the encrypted key import functions of a variety of different cryptographic de...
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underly...
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other de...
Methods for enumerating cryptographic keys based on partial information obtained on key bytes are im...
Side channels provide additional information to skilled adversaries that reduce the effort to determ...
Motivated by the need to assess the concrete security of a device after a side channel attack, ther...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Abstract. The kangaroo method computes a discrete logarithm in an arbitrary cyclic group, given that...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
A Eurocrypt 2013 paper "Security evaluations beyond computing power: How to analyze side-channel att...
Present key sizes for symmetric cryptography are usually required to be at least 80-bit long for sho...
Side-channel attacks are powerful techniques to attack implementations of cryptographic algorithms b...
2Direction Générale de l’Armement–Mâıtrise de l’information, France. Abstract. Current key sizes ...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Key rank estimation provides a measure of the effort that the attacker has to spend bruteforcing the...
We show how to exploit the encrypted key import functions of a variety of different cryptographic de...
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underly...