On 06/30/2014 05:49 PM, Billy Brumley wrote: > What cryptosystems, and furthermore protocols, you can attack and how > you carry out the attack very much depend on the nature of the > fault/defect and the details of the protocol. > > Shameless self promotion: https://eprint.iacr.org/2011/633
Thanks, that paper was actually helpful in showing how it works on ECDH. Ondrej _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
