2009 Ph.D. Research in Microelectronics and Electronics 2009
DOI: 10.1109/rme.2009.5201339
|View full text |Cite
|
Sign up to set email alerts
|

A practical Differential Power Analysis attack against the Miller algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(25 citation statements)
references
References 7 publications
0
25
0
Order By: Relevance
“…The authors suggest randomization and blinding as defense against such attacks, both of which are already used in other algorithms such as RSA. In 2009, a DPA against pairing computations was simulated [64]. It was shown how the secret input point to the Miller Algorithm can be revealed by analyzing a modular multiplication and an addition.…”
Section: Power Analysismentioning
confidence: 99%
“…The authors suggest randomization and blinding as defense against such attacks, both of which are already used in other algorithms such as RSA. In 2009, a DPA against pairing computations was simulated [64]. It was shown how the secret input point to the Miller Algorithm can be revealed by analyzing a modular multiplication and an addition.…”
Section: Power Analysismentioning
confidence: 99%
“…But, contrary to [MFN09] our attack requires either a DPA of the multiplication or a DPA of the addition. For pairings that are defined on elliptic curves over finite fields, usually an extension field of the base fields is required.…”
Section: Introductionmentioning
confidence: 95%
“…Furthermore, the authors of [WS06] conjectured that it may be more difficult to attack some implementations of the Tate pairing if the first argument of the pairing is the secret. In [MFN09] this problem has been addressed for the case where the first argument is represented in Jacobian coordinates. Here, a DPA of a modular multiplication and a DPA of a modular addition was required to succeed.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, considering side channel attacks, we cannot predict if an algorithm is more or less secure than another given the representation of the groups. Weaknesses to side channel attacks of pairing based cryptography over elliptic curve have been highlighted [20,22,23,7,8]. Then, wondering if a pairing implemented in Theta function would be vulnerable to side channel attacks is an important issue for pairing based cryptography and this is the main objective of this contribution.…”
Section: Introductionmentioning
confidence: 99%