Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
The Weil Pairing, and Its Efficient Calculation
Journal of Cryptology
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
A computational introduction to number theory and algebra
A computational introduction to number theory and algebra
A Fault Attack on Pairing-Based Cryptography
IEEE Transactions on Computers
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
Identity-Based Cryptography - Volume 2 Cryptology and Information Security Series
Identity-Based Cryptography - Volume 2 Cryptology and Information Security Series
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Side channel analysis of practical pairing implementations: which path is more secure?
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
IEEE Transactions on Information Theory
The importance of the final exponentiation in pairings when considering fault attacks
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Hi-index | 0.00 |
Several known invasive and non-invasive attacks against pairing algorithms only work if the second but not if the first argument of the pairing is the secret. In this paper we extend some of these attacks to the case where the first argument is the secret. Hence we conclude that positioning the secret as the first argument of the pairing does not necessarily improve the security against (SCAs), as it sometimes has been suggested.