This repository includes the software artifacts used for our paper:
Alex Biryukov, Daniel Dinu, and Yann Le Corre, Side-Channel Attacks meet Secure Network Protocols, ACNS 2017
Features:
- symbolic processing of an initial state
- CPA attack on a given evaluation case
The source code can be used to attack two implementations of the AES:
- S-box implementation
- T-table implementation
For details, read our paper or have a look at the source code.
- matplotlib
- numpy
This work is supported by the CORE project ACRYPT (ID C12-15-4009992) funded by the Fonds National de la Recherche, Luxembourg.