Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Is the paper "Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-bit ECDSA"?


That would be the one.


The first time I heard about attacks on crypto that monitored processor power consumption, I was pretty skeptical. It seems crazy to me that it could work. But of course it does.

Same thing with timing attacks, til I learned how to code one for myself.

It's funny how very very careful you have to be.


Worth pointing out that you don't need to have an attacker watching your power consumption to have the partial nonce leak problem.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: