DOI: 10.1007/978-3-540-73489-5_12
|View full text |Cite
|
Sign up to set email alerts
|

The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
56
0
1

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(57 citation statements)
references
References 13 publications
0
56
0
1
Order By: Relevance
“…But when it comes to PBC the effort that has been spent on the analysis of SCAs is much smaller than in the case of standart ECC. Nevertheless, there are some results that analyze the vulnerability of pairings to passive attacks as well as to active attacks [PV04, KTH + 06, WS06, WS07,PV06].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…But when it comes to PBC the effort that has been spent on the analysis of SCAs is much smaller than in the case of standart ECC. Nevertheless, there are some results that analyze the vulnerability of pairings to passive attacks as well as to active attacks [PV04, KTH + 06, WS06, WS07,PV06].…”
Section: Introductionmentioning
confidence: 99%
“…The authors attacked two algorithms for the Tate pairing. Later, the vulnerability of several algorithms for the Weil, Tate and eta pairings in presence of fault attacks was studied in [WS07]. The authors of [Mra09] analyze the vulnerability of Miller's algorithm against the same fault type as used in [PV06].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Countermeasures for pairing devices have recently been investigated [21,19,25,13,26]. Let e(P, Q) be a pairing for two points P = (x p , y p ), Q = (x q , y q ) on the underlying elliptic curve.…”
Section: Introductionmentioning
confidence: 99%
“…In this method, settings X p ← λx p , Y p ← λy p , and Z p ← λ are performed, and its overhead is 3nM for the η T pairing over F 3 n . Whelan et al also considered SCAs against pairings [25,26]. They concluded that pairings using the BKLS algorithm (such as Ate pairing) might not be vulnerable against SCAs by setting the secret point P to the first parameter of e(P, Q).…”
Section: Introductionmentioning
confidence: 99%