A survey of fault attacks in pairing based cryptography
From MaRDI portal
Publication:892296
DOI10.1007/s12095-014-0114-5zbMath1327.14128OpenAlexW2090996014MaRDI QIDQ892296
Jacques J. A. Fournier, Nadia El Mrabet, Louis Goubin, Ronan Lashermes
Publication date: 18 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0114-5
Data encryption (aspects in computer science) (68P25) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The Weil pairing, and its efficient calculation
- Efficient pairing computation on supersingular abelian varieties
- Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
- Fault Attacks on Pairing-Based Cryptography
- Side Channel Attacks against Pairing over Theta Functions
- Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults
- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?
- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
- A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small Characteristic
- Identity-Based Cryptosystems and Signature Schemes
- On the Efficient Implementation of Pairing-Based Protocols
- FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction
- On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
- Efficient Implementation of Bilinear Pairings on ARM Processors
- A Fault Attack on Pairing-Based Cryptography
- The Eta Pairing Revisited
- Pairing Lattices
- The Arithmetic of Elliptic Curves
- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
- Identity-Based Encryption from the Weil Pairing
- Fault Attacks against the Miller Algorithm in Hessian Coordinates
- Efficient Pairing Computation with Theta Functions
- Optimal Pairings
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks
- Advances in Elliptic Curve Cryptography
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: A survey of fault attacks in pairing based cryptography