Back to Results
First PageMeta Content
Brute-force search / Algorithm / Random walk / Hash table / Precomputation / Mathematics / Search algorithms / Statistics / Kangaroo


Kangaroos in Side-Channel Attacks Tanja Lange1 , Christine van Vredendaal1,2 , and Marnix Wakker2 1 Department of Mathematics and Computer Science Eindhoven University of Technology
Add to Reading List

Document Date: 2014-07-21 04:21:53


Open Document

File Size: 467,47 KB

Share Result on Facebook

Company

Dell / AES / Brightsight B.V. / Bernstein / /

Country

Netherlands / /

Currency

pence / /

/

Facility

Computer Science Eindhoven University of Technology P.O. Box / /

IndustryTerm

important tools / distinguished real-time break / rank estimation algorithm / broken and secure device / identical device / mentioned algorithms / kangaroo algorithm / enumeration algorithm / interval search / encryption algorithm / kangaroo algorithms / logarithm-based systems / search time / cycle finding algorithm / /

Organization

Mathematics and Computer Science Eindhoven University / Department of Mathematics / Organisation for Scientific Research / Eindhoven University of Technology / /

Person

Van Oorschot / Christine van Vredendaal / Tanja Lange / /

Position

mP / representative / k1 mP / /

Product

Pollard / /

ProgrammingLanguage

C++ / /

Technology

encryption / previously mentioned algorithms / cryptography / central processor / underlying kangaroo algorithm / public key / Pollard-kangaroo algorithms / key enumeration algorithm / encryption algorithm / rank estimation algorithm / existing algorithms / Pollard-kangaroo algorithm / i5 Processor / smart card / The algorithm / private key / DLP / kangaroo algorithms / cycle finding algorithm / kangaroo algorithm / improved Pollard-kangaroo algorithm / /

URL

http /

SocialTag