Universite Bordeaux 1
In this paper, the authors show that algebraic techniques can be combined with side-channel attacks in a very effective and natural fashion. As an illustration, they apply them to the block cipher present that is a stimulating first target, due to its simple algebraic structure. The proposed attacks have a number of interesting features: they exploit the information leakages of all the cipher rounds, in common implementation contexts (e.g. assuming a hamming weight leakage model), they recover the block cipher keys after the observation of a single encryption, these attacks can succeed in an unknown-plaintext/ciphertext adversarial scenario and they directly defeat countermeasures such as boolean masking.