Side channel analysis of practical pairing implementations: which path is more secure?
From MaRDI portal
Publication:2876969
Recommendations
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- Implementation attacks \& countermeasures
- Side channel attacks against pairing over theta functions
- Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
- A survey of fault attacks in pairing based cryptography
Cited in
(7)- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- New versions of Miller-loop secured against side-channel attacks
- The Hidden Root Problem
- A survey of fault attacks in pairing based cryptography
- Implementation attacks \& countermeasures
- Side channel attacks against pairing over theta functions
This page was built for publication: Side channel analysis of practical pairing implementations: which path is more secure?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2876969)