Side channel analysis of practical pairing implementations: which path is more secure?
From MaRDI portal
Publication:2876969
DOI10.1007/11958239_7zbMATH Open1295.94155OpenAlexW1547639591MaRDI QIDQ2876969FDOQ2876969
Authors: Claire Whelan, Mike Scott
Publication date: 21 August 2014
Published in: Progress in Cryptology - VIETCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11958239_7
Recommendations
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- Implementation attacks \& countermeasures
- Side channel attacks against pairing over theta functions
- Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
- A survey of fault attacks in pairing based cryptography
Ate pairingTate pairingpairing based cryptographycorrelation power analysis (CPA)\(\eta_T\) pairingside channel analysis (SCA)
Cited In (7)
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
- New versions of Miller-loop secured against side-channel attacks
- The Hidden Root Problem
- A survey of fault attacks in pairing based cryptography
- Implementation attacks \& countermeasures
- Side channel attacks against pairing over theta functions
This page was built for publication: Side channel analysis of practical pairing implementations: which path is more secure?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2876969)