Differential Power Analysis against the Miller Algorithm - Archive ouverte HAL Access content directly
Reports Year : 2008

Differential Power Analysis against the Miller Algorithm

(1) , (2) , (2) , (2) , (3, 1)
1
2
3

Abstract

Pairings permit several protocol simplications and original scheme creation, for example Identity Based Cryptography protocols. Initially, the use of pairings did not involve any secret entry, consequently, side channel attacks were not a threat for pairing based cryptography. On the contrary, in an Identity Based Cryptographic protocol, one of the two entries to the pairing is secret. Side Channel Attacks can be therefore applied to nd this secret. We realize a Differential Power Analysis(DPA) against the Miller algorithm, the central step to compute the Weil, Tate and Ate pairing. Keywords: Pairing, Miller Algorithm, Pairing Based Cryptography, SCA, DPA.
Fichier principal
Vignette du fichier
Version_23_07_08.pdf (676.25 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

lirmm-00323684 , version 1 (22-09-2008)

Identifiers

  • HAL Id : lirmm-00323684 , version 1

Cite

Nadia El Mrabet, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Jean-Claude Bajard. Differential Power Analysis against the Miller Algorithm. RR-08021, 2008. ⟨lirmm-00323684⟩
204 View
513 Download

Share

Gmail Facebook Twitter LinkedIn More