New versions of Miller-loop secured against side-channel attacks
From MaRDI portal
Publication:6169018
DOI10.1007/978-3-031-22944-2_17OpenAlexW4315489945MaRDI QIDQ6169018
Emmanuel Fouotsa, Loubna Ghammam, Nicolas Meloni, Nadia El Mrabet
Publication date: 10 August 2023
Published in: Arithmetic of Finite Fields (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22944-2_17
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40) Fibonacci and Lucas numbers and polynomials and generalizations (11B39) Other number representations (11A67)
Cites Work
- Unnamed Item
- Memory-saving computation of the pairing final exponentiation on BN curves
- A survey of fault attacks in pairing based cryptography
- The Weil pairing, and its efficient calculation
- Updating key size estimations for pairings
- A taxonomy of pairing-friendly elliptic curves
- Guide to Pairing-Based Cryptography
- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?
- Side-Channel Analysis on Blinded Regular Scalar Multiplications
- Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
- Identity-Based Cryptosystems and Signature Schemes
- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication
- A Fault Attack on Pairing-Based Cryptography
- On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
- Analysis of the subtractive algorithm for greatest common divisors
- The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
- Optimal Pairings
- New Point Addition Formulae for ECC Applications
This page was built for publication: New versions of Miller-loop secured against side-channel attacks