References
- L. Zhou, and Z. J. Haas, "Securing ad hoc networks," IEEE Network megazine, vol.13, no.6, pp. 24-30, November/December 1999.
- A. Khalili, J. Katz, and W.A. Arbaugh, "Toward secure key distribution in truly ad-hoc networks," In IEEE Workshop : Security and Assurance in Ad hoc Networks, pp. 342-346, 2003.
- Tae Hyun KIM, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, and Jongin Lim, "Power Analysis Attacks and Countermeasures on ηT Pairing over Binary Fields," ETRI Journal, vol.30, no.1, pp. 68-80, Feb. 2009.
- N.E. Mrabet, M.L. Flottes, and G. D. Natale, "A practical Differential Power Analysis attack against the Miller algorithm," Research in Microelectronics and Electronics, PRIME 2009. Ph.D., pp.308-311, July 2009.
- N.E. Mrabet, "Fault Attacks against the Miller's Algorithm in Edwards Coordinates," In Information Security and Assurance(ISA 2010), pp. 72-85, Miyazaki, Japan, June 2010.
- S. Ghosh, D. Mukhopadhyay, and D. R. Chowdhury, "Fault Attack and Countermeasures on Pairing Based Cryptography," Internation Journal of Network Security, vol.12, no.1, pp. 26-33, Jan. 2011.
- D. Page and F. Vercauteren, "A Fault Attack on Pairing Based Cryptography," IEEE Transactions on Computers, vol.55, no.9, pp. 1075-1080, 2006. https://doi.org/10.1109/TC.2006.134
- C. Whelan and M. Scott, "The Importance of the Final exponentiation in Pairing when considering Fault Attacks," Proc. of Pairing 2007, pp.225-246, Tokyo, Japan, July 2007.
- J. Siverman, "The Arithmetic of Elliptic Curves," Springer-Verlag, 1991.
- E. Brier, M. Joye, Point multiplication on elliptic curves through isogenies, Proc. of AAECC 2003, LNCS 2643, pp.43-50, 2003.
- J.C.Bajard and N.E. Marbet, "Pairing in Cryptography: an arithmetic point of view," Advanced Signal Processing Algorithms, Architectures, and Implementations XVI, part of SPIE, August 2007
- N. E. Mrabet, "What about Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based Protocol?," In Information Security and Assurance(ISA 2009), pp. 122-134, Seoul, Korea, June 2009.
- J.-M. Schmidt and M. Hutter, "Optical and EM Fault-Attacks on CRTbased RSA: Concrete Results," in Austrochip 2007, pp. 61-67, Graz, Austria, Oct. 2007.
- E. Trichina and R. Korkikyan. "Multi fault laser attacks on protected CRT-RSA," In FDTC 2010, pp. 75-86, Santa Barbara, USA, Aug. 2010.
- S. Lang, Algebra, Rev. 3rd Ed., Graduate Texts in Mathematics, Springer-Verlag, 2002.
- D. J. Bernstein and T. Lange. "Faster addition and doubling on elliptic curves," Advanced in Cryptology - ASIACRYPT 2007, pp. 29-50, Kuching, Malaysia, Dec. 2007.
- C. Arene, T. Lange, M. Naehrig and C. Ritzenthaler, "Faster computation of the Tate pairing," Journal of Number Theory, vol.131, no.5, pp. 842-857, May 2011. https://doi.org/10.1016/j.jnt.2010.05.013
- M. Maas, Pairing-Based Cryptography, Master Thesis, Technische Universiteit Eindhoven, 2004.
- Mathematica, http://www.wolfram.com/products/mathematica/in dex.html
Cited by
- A Proposal for Enhanced Miller Algorithm Secure Against Counter Fault Attack vol.50, pp.7, 2013, https://doi.org/10.5573/ieek.2013.50.7.068