What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
DOI10.1007/978-3-642-02617-1_13zbMATH Open1334.94075OpenAlexW1540031003MaRDI QIDQ3634337FDOQ3634337
Authors: Nadia El Mrabet
Publication date: 25 June 2009
Published in: Advances in Information Security and Assurance (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02617-1_13
Recommendations
- Fault Attacks on Pairing-Based Protocols: Revisited
- Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
- Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol
- Making the Diffie-Hellman Protocol Identity-Based
- Vulnerability of two multiple-key agreement protocols
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- The Weil pairing, and its efficient calculation
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- A normal form for elliptic curves
- Another Approach to Pairing Computation in Edwards Coordinates
- Cryptography and Coding
- A Fault Attack on Pairing-Based Cryptography
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- Side channel analysis of practical pairing implementations: which path is more secure?
- Title not available (Why is that?)
Cited In (5)
- New versions of Miller-loop secured against side-channel attacks
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- A survey of fault attacks in pairing based cryptography
- Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
- Fault attacks against the miller algorithm in Hessian coordinates
Uses Software
This page was built for publication: What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3634337)