International audienceAnalyzing the security of cryptosystems under attacks based on the malicious modification of memory registers is a research topic of high importance. This type of attack may affect the randomness of the secret parameters by forcing a limited number of bits to a certain value which can be unknown to the attacker. In this context, we revisit the attack on DSA presented by Faugère, Goyet and Renault during the conference SAC 2012: we modify their method and provide a probabilistic approach in opposition to the heuristic proposed therein to measure the limits of the attack. More precisely, the main problem is formulated as a closest vector problem in a lattice, then we study the distribution of vectors with bounded norm in...
We prove that a system of linear congruences of a particular form has at most a unique solution belo...
Lattice-based cryptography is an extraordinarily popular subfield of cryptography. But since it is a...
International audienceSince the introduction of the LLL algorithm in 1982, lattice reduction has pro...
International audienceAnalyzing the security of cryptosystems under attacks based on the malicious m...
International audienceAnalyzing the security of cryptosystems under attacks based on the malicious m...
We present a polynomial-time algorithm that provably recovers the signer's secret DSA key when a few...
Abstract. Consider the RSA public key cryptosystem with the param-eters N = pq, q < p < 2q, pu...
digital signatures, lattices * Internal Accession Date Only © Copyright Hewlett-Packard Company 1999...
The lattice reduction attack on (EC)DSA (and other Schnorr-like signature schemes) with partially kn...
Abstract. We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We prove that a system of linear congruences of a particular form has at most a unique solution belo...
Lattice-based cryptography is an extraordinarily popular subfield of cryptography. But since it is a...
International audienceSince the introduction of the LLL algorithm in 1982, lattice reduction has pro...
International audienceAnalyzing the security of cryptosystems under attacks based on the malicious m...
International audienceAnalyzing the security of cryptosystems under attacks based on the malicious m...
We present a polynomial-time algorithm that provably recovers the signer's secret DSA key when a few...
Abstract. Consider the RSA public key cryptosystem with the param-eters N = pq, q < p < 2q, pu...
digital signatures, lattices * Internal Accession Date Only © Copyright Hewlett-Packard Company 1999...
The lattice reduction attack on (EC)DSA (and other Schnorr-like signature schemes) with partially kn...
Abstract. We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We describe an attack on the RSA cryptosystem when the private exponent d is chosen to be ’small’, u...
We prove that a system of linear congruences of a particular form has at most a unique solution belo...
Lattice-based cryptography is an extraordinarily popular subfield of cryptography. But since it is a...
International audienceSince the introduction of the LLL algorithm in 1982, lattice reduction has pro...