Proceedings of the 14th International Joint Conference on E-Business and Telecommunications 2017
DOI: 10.5220/0006425501040115
|View full text |Cite
|
Sign up to set email alerts
|

First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…If Bob loses the device where e(U, d B ) is executed, then an attacker can control the input U which is manipulated. The flaw that we present here comes from paper [22] which describes in details the technical aspects.…”
Section: Aimed Targetmentioning
confidence: 99%
See 2 more Smart Citations
“…If Bob loses the device where e(U, d B ) is executed, then an attacker can control the input U which is manipulated. The flaw that we present here comes from paper [22] which describes in details the technical aspects.…”
Section: Aimed Targetmentioning
confidence: 99%
“…In [22] the authors show that the naive correlation search scheme does not result in a successful attack.…”
Section: Attack Schemes Against a Protected Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…In view of the results given in Figures 12 and 13, the number of curves needed to find a 32-bit word is: We improve the efficiency of the attack when compared to [22] where 300 curves were necessary to perform the attack Given that there are 7 other 32-bit words to be found, the total number of traces is: 6.5 Some ideas for extra protections The scheme for this attack does not depend on the configuration for the secret point, whether it is P or Q. The only aspect which comes into play is the choice of the pairing, and more exactly from the choice of the groups G 1 and G 2 .…”
Section: Fig 11: Correlations Related To a Vertical Correlation Collmentioning
confidence: 99%