Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography against side channel attacks. In particular,we show that this countermeasure does not protect Miller's algorithm for pairing computation against fault attack. We then give recommendation for a secure implementation of a pairing based protocol using the Miller algorithm
Pairing-based cryptography (PBC) provides novel security services, such as identity-based encryption...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
International audienceThe field of Pairing Based Cryptography (PBC) has seen recent advances in the ...
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tool...
Article published in the journal Cryptography and Communications http://link.springer.com/article/10...
International audience—Pairing based cryptography (PBC) is touted as an efficient approach to addres...
International audienceInitially, the use of pairings did not involve any secret entry. However in an...
International audienceThe latest implementations of pairings allow efficient schemes for Pairing Bas...
Cette thèse est consacrée à l’étude de la sécurité physique des algorithmesde couplage. Les algorith...
This thesis focuses on the resistance of Pairing implementations againstside channel attacks. Pairin...
Recently, the side channel keeps the attention of researchers in theory of pairing, since, several s...
Article en cours de publicationPairings permit several protocol simplications and original scheme cr...
In dieser Dissertation analysieren wir Schwächen paarungsbasierter kryptographischer Verfahren gegen...
International audienceWe address the question of how a computationally limited device may outsource ...
Pairing-based cryptography (PBC) provides novel security services, such as identity-based encryption...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
International audienceThe field of Pairing Based Cryptography (PBC) has seen recent advances in the ...
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tool...
Article published in the journal Cryptography and Communications http://link.springer.com/article/10...
International audience—Pairing based cryptography (PBC) is touted as an efficient approach to addres...
International audienceInitially, the use of pairings did not involve any secret entry. However in an...
International audienceThe latest implementations of pairings allow efficient schemes for Pairing Bas...
Cette thèse est consacrée à l’étude de la sécurité physique des algorithmesde couplage. Les algorith...
This thesis focuses on the resistance of Pairing implementations againstside channel attacks. Pairin...
Recently, the side channel keeps the attention of researchers in theory of pairing, since, several s...
Article en cours de publicationPairings permit several protocol simplications and original scheme cr...
In dieser Dissertation analysieren wir Schwächen paarungsbasierter kryptographischer Verfahren gegen...
International audienceWe address the question of how a computationally limited device may outsource ...
Pairing-based cryptography (PBC) provides novel security services, such as identity-based encryption...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
International audienceThe field of Pairing Based Cryptography (PBC) has seen recent advances in the ...