TY - CHAP
T1 - Implementation attacks & countermeasures
AU - Whelan, Claire
AU - Page, Dan
AU - Vercauteren, Frederik
AU - Scott, Michael
AU - Marnane, William
PY - 2009
Y1 - 2009
N2 - In this chapter the effect of implementation attacks on the security of pairings is examined. This is a particularly pertinent issue given the increasing efficiency of pairing algorithms, which have recently proved viable for implementation on resource constrained devices where such attacks pose a serious threat. Specifically, we discuss power analysis and fault attacks on a range of pairing algorithms. Countermeasures and their impact on performance are also described.
AB - In this chapter the effect of implementation attacks on the security of pairings is examined. This is a particularly pertinent issue given the increasing efficiency of pairing algorithms, which have recently proved viable for implementation on resource constrained devices where such attacks pose a serious threat. Specifically, we discuss power analysis and fault attacks on a range of pairing algorithms. Countermeasures and their impact on performance are also described.
KW - Bilinear maps
KW - correlation power analysis
KW - differential power analysis
KW - fault analysis
KW - pairings
KW - side channel analysis
UR - https://www.scopus.com/pages/publications/84865496356
U2 - 10.3233/978-1-58603-947-9-226
DO - 10.3233/978-1-58603-947-9-226
M3 - Chapter
AN - SCOPUS:84865496356
SN - 9781586039479
T3 - Cryptology and Information Security Series
SP - 226
EP - 262
BT - Identity-Based Cryptography
PB - IOS Press
ER -