Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?
From MaRDI portal
Publication:2876969
DOI10.1007/11958239_7zbMath1295.94155OpenAlexW1547639591MaRDI QIDQ2876969
Publication date: 21 August 2014
Published in: Progress in Cryptology - VIETCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11958239_7
Tate pairingAte pairingpairing based cryptographycorrelation power analysis (CPA)\(\eta_T\) pairingside channel analysis (SCA)
Related Items (4)
A survey of fault attacks in pairing based cryptography ⋮ New versions of Miller-loop secured against side-channel attacks ⋮ The Hidden Root Problem ⋮ What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
This page was built for publication: Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?