Our Result:
Practical Key-Recovery
We revisit the work of [Nguyen Regev 06] to tackle Perturbation and Deformation countermeasures
- Generalize the analysis to objects
more complex than parallelepipeds
- Theoretical evidence that a
similar attack should still work
- Fully implemented
Successful key-recovery using
4000 signatures, in 5 core-hours