Chip Security TestingΒ 
Binary Security AnalysisΒ 
Contact us
Lattice Side Channel

Lattice attacks for side-channel analysis

In this module, you will learn about lattice attacks and how they can be combined with side-channel analysis to break public key implementations. After an introductions to lattices, we will review the Hidden Number Problem, which is at the core of most of the lattices attacks on ECDSA. We will then study the most common side-channel leakage scenarios on ECDSA leading to a full private key recovery. As an evaluator, you will learn how to estimate the criticality of attacks leading to partial key recovery.

Covered Topics

  • Understand lattices
  • Understand the Hidden Number Problem
  • Understand the main lattice attack vectors on ECDSA


  • Solve a Hidden Number Problem using LLL
  • Implement a lattice attack on ECDSA with weak most significant bits
  • Implement a lattice attack on ECDSA with weak least significant bits


  • Familiar with Elliptic Curves
  • Basic knowledge in coding (Python)
  • Familiar with side-channel concepts (module SCAE.1)
Contact us

Practical information

Overall duration: 1-day if in-person / flexible duration if online.

Schedule: 9am-1pm - 2pm-6 pm CET (in-person)

Number of trainees: 1 max.

Our Coaches

CopyRights eShard 2024.
All rights reserved
Privacy policy | Legal Notice