Communications in Cryptology IACR CiC
Search requires all terms to appear in the result
Search results for Lattices
  1. Gabrielle De Micheli, Nadia Heninger
    Published 2024-04-09 PDFPDF

    Side-channel attacks targeting cryptography may leak only partial or indirect information about the secret keys. There are a variety of techniques in the literature for recovering secret keys from partial information. In this work, we survey several of the main families of partial key recovery algorithms for RSA, (EC)DSA, and (elliptic curve) Diffie-Hellman, the classical public-key cryptosystems in common use today. We categorize the known techniques by the structure of the information that is learned by the attacker, and give simplified examples for each technique to illustrate the underlying ideas.