A survey of fault attacks in pairing based cryptography
From MaRDI portal
Publication:892296
DOI10.1007/S12095-014-0114-5zbMATH Open1327.14128OpenAlexW2090996014MaRDI QIDQ892296FDOQ892296
Jacques J. A. Fournier, Nadia El Mrabet, Louis Goubin, Ronan Lashermes
Publication date: 18 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0114-5
Recommendations
Data encryption (aspects in computer science) (68P25) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- Title not available (Why is that?)
- A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small Characteristic
- Identity-Based Cryptosystems and Signature Schemes
- The Arithmetic of Elliptic Curves
- Identity-Based Encryption from the Weil Pairing
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- Efficient Pairing Computation with Theta Functions
- The Weil pairing, and its efficient calculation
- Efficient pairing computation on supersingular abelian varieties
- Title not available (Why is that?)
- On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
- The Eta Pairing Revisited
- Pairing Lattices
- Optimal Pairings
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Advances in Elliptic Curve Cryptography
- Advances in Cryptology - ASIACRYPT 2003
- Fault Attacks on Pairing-Based Cryptography
- A Fault Attack on Pairing-Based Cryptography
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
- Side Channel Attacks against Pairing over Theta Functions
- Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults
- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?
- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
- On the Efficient Implementation of Pairing-Based Protocols
- FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction
- Efficient Implementation of Bilinear Pairings on ARM Processors
- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
- Fault Attacks against the Miller Algorithm in Hessian Coordinates
- Title not available (Why is that?)
Cited In (5)
- New versions of Miller-loop secured against side-channel attacks
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- A Fault Attack on Pairing-Based Cryptography
- Implementation attacks \& countermeasures
- Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
This page was built for publication: A survey of fault attacks in pairing based cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892296)