Technical perspective: Attacking cryptographic key exchange with precomputation