UCL/ERC Key Enumeration Page

Efficient Implementation of Key Enumeration and Key Rank Estimation Algorithms.

Please refer to the following companion papers whenever you use the source codes:
  • For key enumeration:
    N. Veyrat-Charvillon, B. Gerard, M. Renauld, F.-X. Standaert, An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks, in the proceedings of SAC 2012, Lecture Notes in Computer Science, vol 7707, pp 391-407, Windsor, Ontario, Canada, August 2012, Springer, (pdf file).
  • For key rank estimation:
    N. Veyrat-Charvillon, B. Gerard, F.-X. Standaert, Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?, to appear in the proceedings of Eurocrypt 2013, Lecture Notes in Computer Science, vol xxxx, pp yyy-zzz, Athens, Greece, May 2013, Springer, (pdf file).

  • Readme.
  • Open source code.