Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
From MaRDI portal
Publication:2947089
DOI10.1007/978-3-319-18681-8_21zbMATH Open1441.94077OpenAlexW2182718385MaRDI QIDQ2947089FDOQ2947089
Authors: Nadia El Mrabet, Emmanuel Fouotsa
Publication date: 21 September 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-18681-8_21
Recommendations
- A Fault Attack on Pairing-Based Cryptography
- Fault attacks on pairing-based cryptography
- Fault Attacks on Pairing-Based Protocols: Revisited
- A survey of fault attacks in pairing based cryptography
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- Cryptanalysis of two fault countermeasure schemes
- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
- Fault attacks on elliptic curve cryptosystems
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
Cites Work
- The Magma algebra system. I: The user language
- A taxonomy of pairing-friendly elliptic curves
- A new index calculus algorithm with complexity \(L(1/4+o(1))\) in small characteristic
- Identity-Based Encryption from the Weil Pairing
- A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
- Elliptic curves. Number theory and cryptography
- The Weil pairing, and its efficient calculation
- Bruno Buchberger's PhD thesis 1965: An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal. Translation from the German
- On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
- The Eta Pairing Revisited
- Pairing Lattices
- Optimal Pairings
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Cryptography and Coding
- Topics in Cryptology – CT-RSA 2005
- Fault attacks on pairing-based cryptography
- A Fault Attack on Pairing-Based Cryptography
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- Inverting the final exponentiation of Tate pairings on ordinary elliptic curves using faults
- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
- Title not available (Why is that?)
Cited In (8)
- Fault attacks on pairing-based cryptography
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- New versions of Miller-loop secured against side-channel attacks
- A Fault Attack on Pairing-Based Cryptography
- A survey of fault attacks in pairing based cryptography
- Faster beta Weil pairing on BLS pairing friendly curves with odd embedding degree
- Implementation attacks \& countermeasures
- Side channel analysis of practical pairing implementations: which path is more secure?
This page was built for publication: Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2947089)