OUTLINE
1. Background: side-channel analysis and key enumeration;
2. Algorithms: the intuition behind:
I
Convolution-based enumeration (Poussier et al. CHES 2016);
I
Path-counting-based enumeration (Martin et al. Asiacrypt 2015).
3. Analysis: compare:
I
Mathematical properties: equivalent, only algorithmic expression differs.
I
Practical performance: path-counting enumeration almost always faster.
4. Conclusion: implications for a side-channel attacker.
2
评论0