What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
From MaRDI portal
Publication:3634337
Recommendations
- Fault Attacks on Pairing-Based Protocols: Revisited
- Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
- Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol
- Making the Diffie-Hellman Protocol Identity-Based
- Vulnerability of two multiple-key agreement protocols
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
Cites work
- scientific article; zbMATH DE number 3577144 (Why is no real title available?)
- scientific article; zbMATH DE number 1982614 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A Fault Attack on Pairing-Based Cryptography
- A normal form for elliptic curves
- Another Approach to Pairing Computation in Edwards Coordinates
- Cryptography and Coding
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Identity-based cryptosystems and signature schemes
- Side channel analysis of practical pairing implementations: which path is more secure?
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- The Weil pairing, and its efficient calculation
Cited in
(5)- New versions of Miller-loop secured against side-channel attacks
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- A survey of fault attacks in pairing based cryptography
- Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
- Fault attacks against the miller algorithm in Hessian coordinates
This page was built for publication: What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3634337)