Filters








1 Hit in 4.2 sec

Don't forget your roots: constant-time root finding over 픽 2 m [article]

Douglas Marcelino Beppler Martins, Gustavo Banegas, Ricardo Felipe Custódio
2019 IACR Cryptology ePrint Archive  
This timing attack recovers secret information because of a timing variance in finding roots in a polynomial.  ...  We present four algorithms to find roots that are protected against remote timing exploitation.  ...  We want to extend the acknowledgments to Sonia Belaïd from Cryptoexperts for the discussions about timing attacks.  ... 
dblp:journals/iacr/MartinsBC19 fatcat:sedwcxip4vcgpfhbifhqgt3hzm