Differential Power Analysis against the Miller Algorithm - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Access content directly
Reports Year : 2008

Differential Power Analysis against the Miller Algorithm


Pairings permit several protocol simplications and original scheme creation, for example Identity Based Cryptography protocols. Initially, the use of pairings did not involve any secret entry, consequently, side channel attacks were not a threat for pairing based cryptography. On the contrary, in an Identity Based Cryptographic protocol, one of the two entries to the pairing is secret. Side Channel Attacks can be therefore applied to nd this secret. We realize a Differential Power Analysis(DPA) against the Miller algorithm, the central step to compute the Weil, Tate and Ate pairing. Keywords: Pairing, Miller Algorithm, Pairing Based Cryptography, SCA, DPA.
Fichier principal
Vignette du fichier
Version_23_07_08.pdf (676.25 Ko) Télécharger le fichier
Origin Files produced by the author(s)

Dates and versions

lirmm-00323684 , version 1 (22-09-2008)


  • HAL Id : lirmm-00323684 , version 1


Nadia El Mrabet, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Jean-Claude Bajard. Differential Power Analysis against the Miller Algorithm. RR-08021, 2008. ⟨lirmm-00323684⟩
226 View
553 Download


Gmail Mastodon Facebook X LinkedIn More