Article published in the journal Cryptography and Communications http://link.springer.com/article/10.1007%2Fs12095-014-0114-5The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography. These make the use of pairings suitable for small and constrained devices (smart phones, smart cards.. .) in addition to more powerful platforms. As for any cryptographic algorithm which may be deployed in insecure locations, these implementations must be secure against physical attacks, and in particular fault attacks. In this paper, we present the state-of-the-art of fault attacks against pairing algorithms, more precisely fault attacks against the Miller algorithm and the final exponentiation which are the two parts of a ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Pairings are cryptographic algorithms allowing new protocols for public-key cryptography. After a de...
Abstract—Several fault attacks against pairing-based cryptography have been described theoretically ...
Article published in the journal Cryptography and Communications http://link.springer.com/article/10...
International audienceThe latest implementations of pairings allow efficient schemes for Pairing Bas...
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tool...
International audience—Pairing based cryptography (PBC) is touted as an efficient approach to addres...
International audienceInitially, the use of pairings did not involve any secret entry. However in an...
In dieser Dissertation analysieren wir Schwächen paarungsbasierter kryptographischer Verfahren gegen...
International audienceOver the last ten years, the use of bilinear maps or " pairings " as building ...
AbstractMany research papers in pairing-based cryptography treat pairings as a “black box”. These pa...
Abstract. Several papers have studied fault attacks on computing a pairing value e(P,Q), where P is ...
Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public ...
Les couplages sont des algorithmes cryptographiques qui permettent de nouveaux protocoles de cryptog...
Cette thèse est consacrée à l’étude de la sécurité physique des algorithmesde couplage. Les algorith...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Pairings are cryptographic algorithms allowing new protocols for public-key cryptography. After a de...
Abstract—Several fault attacks against pairing-based cryptography have been described theoretically ...
Article published in the journal Cryptography and Communications http://link.springer.com/article/10...
International audienceThe latest implementations of pairings allow efficient schemes for Pairing Bas...
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tool...
International audience—Pairing based cryptography (PBC) is touted as an efficient approach to addres...
International audienceInitially, the use of pairings did not involve any secret entry. However in an...
In dieser Dissertation analysieren wir Schwächen paarungsbasierter kryptographischer Verfahren gegen...
International audienceOver the last ten years, the use of bilinear maps or " pairings " as building ...
AbstractMany research papers in pairing-based cryptography treat pairings as a “black box”. These pa...
Abstract. Several papers have studied fault attacks on computing a pairing value e(P,Q), where P is ...
Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public ...
Les couplages sont des algorithmes cryptographiques qui permettent de nouveaux protocoles de cryptog...
Cette thèse est consacrée à l’étude de la sécurité physique des algorithmesde couplage. Les algorith...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Pairings are cryptographic algorithms allowing new protocols for public-key cryptography. After a de...
Abstract—Several fault attacks against pairing-based cryptography have been described theoretically ...