HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation

Differential Power Analysis against the Miller Algorithm

Nadia El Mrabet 1 Giorgio Di Natale 2 Marie-Lise Flottes 2 Bruno Rouzeyre 2 Jean-Claude Bajard 3, 1
1 ARITH - Arithmétique informatique
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
2 SysMIC - Conception et Test de Systèmes MICroélectroniques
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : Pairings permit several protocol simplications and original scheme creation, for example Identity Based Cryptography protocols. Initially, the use of pairings did not involve any secret entry, consequently, side channel attacks were not a threat for pairing based cryptography. On the contrary, in an Identity Based Cryptographic protocol, one of the two entries to the pairing is secret. Side Channel Attacks can be therefore applied to nd this secret. We realize a Differential Power Analysis(DPA) against the Miller algorithm, the central step to compute the Weil, Tate and Ate pairing. Keywords: Pairing, Miller Algorithm, Pairing Based Cryptography, SCA, DPA.
Document type :
Complete list of metadata

Cited literature [4 references]  Display  Hide  Download

Contributor : Nadia El Mrabet Connect in order to contact the contributor
Submitted on : Monday, September 22, 2008 - 6:08:13 PM
Last modification on : Tuesday, March 15, 2022 - 12:55:42 PM
Long-term archiving on: : Monday, October 8, 2012 - 1:21:19 PM


Files produced by the author(s)


  • HAL Id : lirmm-00323684, version 1


Nadia El Mrabet, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Jean-Claude Bajard. Differential Power Analysis against the Miller Algorithm. RR-08021, 2008. ⟨lirmm-00323684⟩



Record views


Files downloads