Re: [openssl-users] Why do we try out all possible combinations of top bits in OpenSSL timing attack?

2017-02-06 Thread Viktor Dukhovni
> On Feb 6, 2017, at 10:07 AM, Salz, Rich via openssl-users > wrote: > > Michael was kind to post some replies. > > I think a better forum to discuss this is one of the following, which has > more focus on cryptographic science and less on “how do I use the CLI” >

Re: [openssl-users] Why do we try out all possible combinations of top bits in OpenSSL timing attack?

2017-02-06 Thread Salz, Rich via openssl-users
Michael was kind to post some replies. I think a better forum to discuss this is one of the following, which has more focus on cryptographic science and less on “how do I use the CLI” http://www.metzdowd.com/mailman/listinfo/cryptography https://www.irtf.org/mailman/listinfo/cfrg --

Re: [openssl-users] Why do we try out all possible combinations of top bits in OpenSSL timing attack?

2017-02-06 Thread Michael Wojcik
[Snipped HTML content, since Outlook can't quote it properly and it was garbled anyway.] openssl-users doesn't really seem like the right place to discuss this (the sci.crypt newsgroup or a relevant area of the sprawling StackOverflow empire would be better), but it's a low-traffic list, so

[openssl-users] Why do we try out all possible combinations of top bits in OpenSSL timing attack?

2017-02-05 Thread Dipanjan Das
Hi, down votefavorite In the paper titled Remote Timing Attacks are Practical , the authors mention the