Efficient Implementation of Key Enumeration and Key Rank Estimation Algorithms.
Please refer to the following companion papers whenever
you use the source codes:
For key enumeration:
N. Veyrat-Charvillon, B. Gerard, M. Renauld, F.-X. Standaert,
An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks,
in the proceedings of SAC 2012, Lecture Notes in Computer Science, vol 7707, pp 391-407,
Windsor, Ontario, Canada, August 2012, Springer,
(pdf file).
For key rank estimation:
N. Veyrat-Charvillon, B. Gerard, F.-X. Standaert,
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?,
to appear in the proceedings of Eurocrypt 2013, Lecture Notes in Computer Science, vol xxxx, pp yyy-zzz,
Athens, Greece, May 2013, Springer, (pdf file).