What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
From MaRDI portal
Publication:3634337
DOI10.1007/978-3-642-02617-1_13zbMath1334.94075OpenAlexW1540031003MaRDI QIDQ3634337
Publication date: 25 June 2009
Published in: Advances in Information Security and Assurance (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02617-1_13
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items (3)
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography ⋮ A survey of fault attacks in pairing based cryptography ⋮ New versions of Miller-loop secured against side-channel attacks
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The Weil pairing, and its efficient calculation
- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?
- Identity-Based Cryptosystems and Signature Schemes
- A Fault Attack on Pairing-Based Cryptography
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- A normal form for elliptic curves
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- Another Approach to Pairing Computation in Edwards Coordinates
- Cryptography and Coding
This page was built for publication: What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?