Peer-Reviewed Journal Details
Mandatory Fields
Whelan, C,Page, D,Vercauteren, F,Scott, M,Marnane, W,Joye, M,Neven, G
2009
September
Identity-Based Cryptography
Implementation Attacks & Countermeasures
Validated
()
Optional Fields
Bilinear maps pairings side channel analysis differential power analysis correlation power analysis fault analysis
2
226
243
In this chapter the effect of implementation attacks on the security of pairings is examined. This is a particularly pertinent issue given the increasing efficiency of pairing algorithms, which have recently proved viable for implementation on resource constrained devices where such attacks pose a serious threat. Specifically, we discuss power analysis and fault attacks on a range of pairing algorithms. Countermeasures and their impact on performance are also described.
10.3233/978-1-58603-947-9-226
Grant Details