{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:43:07Z","timestamp":1725745387752},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642406621"},{"type":"electronic","value":"9783642406638"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40663-8_14","type":"book-chapter","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T01:03:57Z","timestamp":1376960637000},"page":"132-146","source":"Crossref","is-referenced-by-count":0,"title":["Side Channel Attacks against Pairing over Theta Functions"],"prefix":"10.1007","author":[{"given":"Nadia","family":"El Mrabet","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"1","volume-title":"WOEC 1996: Proceedings of the Second USENIX Workshop on Electronic Commerce","author":"R. Anderson","year":"1996","unstructured":"Anderson, R., Kuhn, M.: Tamper resistance: a cautionary note. In: WOEC 1996: Proceedings of the Second USENIX Workshop on Electronic Commerce, pp. 1\u201311. USENIX Association, Berkeley (1996)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-642-23951-9_28","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"R.C.C. Cheung","year":"2011","unstructured":"Cheung, R.C.C., Duquesne, S., Fan, J., Guillermin, N., Verbauwhede, I., Yao, G.X.: Fpga implementation of pairings using residue number system and lazy reduction. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 421\u2013441. Springer, Heidelberg (2011)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-13013-7_14","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"C. Costello","year":"2010","unstructured":"Costello, C., Lange, T., Naehrig, M.: Faster pairing computations on curves with high-degree twists. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol.\u00a06056, pp. 224\u2013242. Springer, Heidelberg (2010)"},{"issue":"5-6","key":"14_CR4","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.compeleceng.2007.05.009","volume":"33","author":"E. Mulder De","year":"2007","unstructured":"De Mulder, E., \u00d6rs, S.B., Preneel, B., Verbauwhede, I.: Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. Comput. Electr. Eng.\u00a033(5-6), 367\u2013382 (2007)","journal-title":"Comput. Electr. Eng."},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-36334-4_17","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2012","author":"S. Duquesne","year":"2013","unstructured":"Duquesne, S., Fouotsa, E.: Tate pairing computation on jacobi\u2019s elliptic curves. In: Abdalla, M., Lange, T. (eds.) Pairing 2012. LNCS, vol.\u00a07708, pp. 254\u2013269. Springer, Heidelberg (2013)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-02617-1_13","volume-title":"Advances in Information Security and Assurance","author":"N. El Mrabet","year":"2009","unstructured":"El Mrabet, N.: What about vulnerability to a fault attack of the miller\u2019s algorithm during an identity based protocol? In: Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T.-h., Yeo, S.-S. (eds.) ISA 2009. LNCS, vol.\u00a05576, pp. 122\u2013134. Springer, Heidelberg (2009)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"El Mrabet, N., Di Natale, G., Flottes, M.L.: A practical differential power analysis attack against the miller algorithm. In: PRIME 2009 - 5th Conference on Ph.D. Research in Microelectronics and Electronics, Circuits and Systems Magazine. IEEE Xplore (2009)","DOI":"10.1109\/RME.2009.5201339"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"El Mrabet, N., Page, D., Vercauteren, F.: Fault attacks on pairing based cryptography: A state of the art. In: Joye, M., Tunstall, M. (eds.) Fault Analysis in Cryptography. Information Security and Cryptography, pp. 221\u2013236. Springer (2012)","DOI":"10.1007\/978-3-642-29656-7_13"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Galbraith, S.: Pairings in Advances in Elliptic Curve Cryptography. London Mathematical Society Lecture Note Series, vol.\u00a0317. Cambridge University Press (2005)","DOI":"10.1017\/CBO9780511546570.011"},{"issue":"5","key":"14_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TNS.1965.4323904","volume":"12","author":"D. Habing","year":"1965","unstructured":"Habing, D.: The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits. IEEE Transactions on Nuclear Science\u00a012(5), 91\u2013100 (1965)","journal-title":"IEEE Transactions on Nuclear Science"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-85538-5_2","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2008","author":"F. Hess","year":"2008","unstructured":"Hess, F.: Pairing Lattices. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol.\u00a05209, pp. 18\u201338. Springer, Heidelberg (2008)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Hess, F., Smart, N., Vercauteren, F.: The Eta Pairing Revisited, vol.\u00a052, pp. 4595\u20134602 (2006)","DOI":"10.1109\/TIT.2006.881709"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-89754-5_31","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"S. Ionica","year":"2008","unstructured":"Ionica, S., Joux, A.: Another approach to pairing computation in Edwards coordinates. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 400\u2013413. Springer, Heidelberg (2008)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-642-14518-6_20","volume-title":"Algorithmic Number Theory","author":"M. Joye","year":"2010","unstructured":"Joye, M., Tibouchi, M., Vergnaud, D.: Huff\u2019s model for elliptic curves. In: Hanrot, G., Morain, F., Thom\u00e9, E. (eds.) ANTS-IX. LNCS, vol.\u00a06197, pp. 234\u2013250. Springer, Heidelberg (2010)"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-17455-1_1","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"K. Lauter","year":"2010","unstructured":"Lauter, K., Montgomery, P., Naehrig, M.: An analysis of affine coordinates for pairing computation. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol.\u00a06487, pp. 1\u201320. Springer, Heidelberg (2010)"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-14518-6_21","volume-title":"Algorithmic Number Theory","author":"D. Lubicz","year":"2010","unstructured":"Lubicz, D., Robert, D.: Efficient pairing computation with theta functions. In: Hanrot, G., Morain, F., Thom\u00e9, E. (eds.) ANTS-IX. LNCS, vol.\u00a06197, pp. 251\u2013269. Springer, Heidelberg (2010)"},{"key":"14_CR18","unstructured":"Mangard, S., Oswald, E., Popp, T.: DPA book. Graz University of Technology (2007)"},{"issue":"4","key":"14_CR19","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s00145-004-0315-8","volume":"17","author":"V.S. Miller","year":"2004","unstructured":"Miller, V.S.: The weil pairing, and its efficient calculation. Journal of Cryptology\u00a017(4), 235\u2013261 (2004)","journal-title":"Journal of Cryptology"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/TC.2006.134","volume":"55","author":"D. Page","year":"2006","unstructured":"Page, D., Vercauteren, F.: A fault attack on pairing-based cryptography. IEEE Trans. Computers\u00a055, 1075\u20131080 (2006)","journal-title":"IEEE Trans. Computers"},{"issue":"1","key":"14_CR21","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/TIT.2009.2034881","volume":"56","author":"F. Vercauteren","year":"2010","unstructured":"Vercauteren, F.: Optimal pairings. IEEE Transactions on Information Theory\u00a056(1), 455\u2013461 (2010)","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-540-73489-5_12","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2007","author":"C. Whelan","year":"2007","unstructured":"Whelan, C., Scott, M.: The importance of the final exponentiation in pairings when considering fault attacks. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol.\u00a04575, pp. 225\u2013246. Springer, Heidelberg (2007)"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/11958239_7","volume-title":"Progress in Cryptology - VIETCRYPT 2006","author":"C. Whelan","year":"2006","unstructured":"Whelan, C., Scott, M.: Side channel analysis of practical pairing implementations: Which path is more secure? In: Nguy\u00ean, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol.\u00a04341, pp. 99\u2013114. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Algebraic Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40663-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T06:17:20Z","timestamp":1596349040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40663-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642406621","9783642406638"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40663-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}