Tamper Resistance a Cautionary Note The Second USENIX Workshop on Electronic Commerce Proceedings, 1996. ,
Pairing in cryptography: an arithmetic point de view, Advanced Signal Processing Algorithms, Architectures, and Implementations XVI, part of SPIE, 2007. ,
Identity-based encryption from the Weil pairing, Crypto 2001, pp.213-229, 2001. ,
Fast Point Multiplication on Elliptic Curves through Isogenies, AAECC 2003, p.4350, 2003. ,
DOI : 10.1007/3-540-44828-4_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.6968
On the importance of checking cryptographic protocols faults Advances in Cryptology Eurocrypt, Lecture Notes in Comput. Sci, vol.1233, p.3751, 1997. ,
Handbook of elliptic and hyperelliptic curve cryptography, Discrete Math. Appl, vol.20051020, 2006. ,
DOI : 10.1201/9781420034981
Scan Based Side Channel Attack on Dedicated Hardware Implementation of Data Encryption Standard Test Conference, pp.339-344, 2004. ,
A normal Form for Elliptic Curve Bulletin of the, 2007. ,
The Use of Lasers to Simulate Radiation-Induced Transients in Semiconductor Devices and Circuits, IEEE Transactions On Nuclear Science, vol.39, pp.1647-1653, 1992. ,
Pairing-Based Cryptography at High Security Levels, Proceedings of the Tenth IMA International Conference on Cryptography and Coding, pp.13-36, 2005. ,
DOI : 10.1007/11586821_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9402
The Theory of Error-Correcting Codes II North-Holland Mathematical Library, 1998. ,
An introduction to pairing-based cryptography Notes from lectures given in Santander, Spain, 2005. ,
The Weil pairing and its ecient calculation, Journal of Cryptology, vol.17, pp.235-261, 2004. ,
Fault and Side Channel Attacks on Pairing based Cryptography, IEEE Transactions on Computers, vol.55, issue.9, pp.1075-1080, 2006. ,
Identity Based Cryptosystems and Signature Schemes Advances in Cryptology Crypto '84, LNCS, vol.196, pp.47-53, 1984. ,
Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?, Lecture Notes in Computer Science, vol.4341, pp.99-114 ,
DOI : 10.1007/11958239_7
The Importance of the Final exponentiation in Pairings when considering Fault Attacks Lecture Notes in Computer Science, 2007. ,