Failure of the point blinding countermeasure against fault attack in pairing-based cryptography

2Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography against side channel attacks. In particular, we show that this countermeasure does not protect Miller’s algorithm for pairing computation against fault attack. We then give recommendation for a secure implementation of a pairing based protocol using the Miller algorithm.

Cite

CITATION STYLE

APA

El Mrabet, N., & Fouotsa, E. (2015). Failure of the point blinding countermeasure against fault attack in pairing-based cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9084, pp. 259–273). Springer Verlag. https://doi.org/10.1007/978-3-319-18681-8_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free