{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:44:17Z","timestamp":1762004657785},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,10,5]],"date-time":"2014-10-05T00:00:00Z","timestamp":1412467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s12095-014-0114-5","type":"journal-article","created":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T02:50:57Z","timestamp":1412391057000},"page":"185-205","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A survey of fault attacks in pairing based cryptography"],"prefix":"10.1007","volume":"7","author":[{"given":"Nadia","family":"El Mrabet","sequence":"first","affiliation":[]},{"given":"Jacques J. A.","family":"Fournier","sequence":"additional","affiliation":[]},{"given":"Louis","family":"Goubin","sequence":"additional","affiliation":[]},{"given":"Ronan","family":"Lashermes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"key":"114_CR1","unstructured":"Anderson, R., Kuhn, M.: Tamper resistance \u2013 a cautionary note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, pp. 1\u201311 (1996)"},{"key":"114_CR2","doi-asserted-by":"crossref","unstructured":"Aranha, D.F., Beuchat, J.-L., Detrey, J., Estibals, N.: Optimal eta pairing on supersingular genus-2 binary hyperelliptic curves. In: Orr Dunkelman (ed.) CT-RSA, volume 7178 of Lecture Notes in Computer Science, pp. 98\u2013115. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-27954-6_7"},{"key":"114_CR3","doi-asserted-by":"crossref","unstructured":"Bae, K., Moon, S., Ha, J.: Instruction fault attack on the miller algorithm in a pairing-based cryptosystem. In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on July 2013, pp. 167\u2013174 (2013)","DOI":"10.1109\/IMIS.2013.36"},{"key":"114_CR4","doi-asserted-by":"crossref","unstructured":"Bajard, J.-C., El Mrabet, N.: Pairing in cryptography: An arithmetic point de view. In: Advanced Signal Processing Algorithms, Architectures, and Implementations XVI. part of SPIE (2007)","DOI":"10.1117\/12.733789"},{"key":"114_CR5","unstructured":"Barenghi, A, Bertoni, G., Breveglieri, L., Pelosi, G.: A fpga coprocessor for the cryptographic tate pairing over fp. In: Fifth International Conference on Information Technology: New Generations, 2008. ITNG 2008, pp. 112\u2013119 (2008)"},{"issue":"3","key":"114_CR6","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s10623-006-9033-6","volume":"42","author":"PSLM Barreto","year":"2007","unstructured":"Barreto, P.S.L.M., Galbraith, S.D., O\u2019Eigeartaigh, C., Scott, M.: Efficient pairing computation on supersingular abelian varieties. Des. Codes Crypt. 42(3), 239\u2013271 (2007)","journal-title":"Des. Codes Crypt."},{"key":"114_CR7","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546570","volume-title":"Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)","author":"IF Blake","year":"2005","unstructured":"Blake, I.F., Seroussi, G., Smart, N., Cassels, J.W.S.: Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). Cambridge University Press, New York (2005)"},{"key":"114_CR8","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., Gomes da Silva, R., G\u00fcnther, P., Kr\u00e4mer, J., Seifert, J.-P.: A practical second-order fault attack against a real-world pairing implementation. In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (2014)","DOI":"10.1109\/FDTC.2014.22"},{"key":"114_CR9","first-page":"36","volume-title":"FDTC, volume 4236 of Lecture Notes in Computer Science","author":"J Blomer","year":"2006","unstructured":"Blomer, J., Otto, M., Seifert, J.-P.: Sign change fault attacks on elliptic curve cryptosystems. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC, volume 4236 of Lecture Notes in Computer Science, pp. 36\u201352. Springer, Berlin (2006)"},{"issue":"3","key":"114_CR10","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Matthew, F.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"114_CR11","first-page":"421","volume-title":"Cryptographic Hardware and Embedded Systems? CHES 2011, volume 6917 of Lecture Notes in Computer Science","author":"RCC Cheung","year":"2011","unstructured":"Cheung, R.C.C., Duquesne, S., Fan, J., Guillermin, N., Verbauwhede, I., Yao, G.: Fpga implementation of pairings using residue number system and lazy reduction. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems? CHES 2011, volume 6917 of Lecture Notes in Computer Science, pp. 421\u2013441. Springer, Berlin (2011)"},{"key":"114_CR12","doi-asserted-by":"crossref","unstructured":"Cohen, H., Frey, G. (eds.) Handbook of elliptic and hyperelliptic curve cryptography. Discrete Math Application. Chapman & Hall, London (2006)","DOI":"10.1201\/9781420034981"},{"issue":"5-6","key":"114_CR13","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.compeleceng.2007.05.009","volume":"33","author":"ED Mulder","year":"2007","unstructured":"Mulder, E.D., \u00d6rs, S.B., Preneel, B., Verbauwhede, I.: Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. Comput. Electr. Eng. 33(5-6), 367\u2013382 (2007)","journal-title":"Comput. Electr. Eng."},{"key":"114_CR14","doi-asserted-by":"crossref","unstructured":"Dehbaoui, A., Dutertre, J.-M., Robisson, B., Tria, A.: Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES. In: FDTC, pp. 7\u201315 IEEE (2012)","DOI":"10.1109\/FDTC.2012.15"},{"key":"114_CR15","first-page":"111","volume-title":"ASIACRYPT, volume 2894 of Lecture Notes in Computer Science","author":"IM Duursma","year":"2003","unstructured":"Duursma, I.M., Lee, H.-S.: Tate pairing implementation for hyperelliptic curves y 2 = x p \u2212x+d. In: Laih, C.-S. (ed.) ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, pp. 111\u2013123. Springer, Berlin (2003)"},{"key":"114_CR16","doi-asserted-by":"crossref","unstructured":"El Mrabet, N.: What about Vulnerability to a Fault Attack of the Miller\u2019s algorithm During an Identity Based Protocol?. In: Advances in Information Security and Assurance, volume 5576 of LNCS, pp. 122\u2013134. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-02617-1_13"},{"key":"114_CR17","first-page":"709","volume":"2011","author":"N El Mrabet","year":"2011","unstructured":"El Mrabet, N.: Fault attack against Miller\u2019s algorithm. IACR Cryptol. ePrint Arch. 2011, 709 (2011)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"114_CR18","first-page":"132","volume-title":"CAI, volume 8080 of Lecture Notes in Computer Science","author":"N El Mrabet","year":"2013","unstructured":"El Mrabet, N.: Side channel attacks against pairing over theta functions. In: Muntean, T., Poulakis, D., Rolland, R. (eds.) CAI, volume 8080 of Lecture Notes in Computer Science, pp. 132\u2013146. Springer, Berlin (2013)"},{"key":"114_CR19","unstructured":"El Mrabet, N., Fournier, J.J.A., Goubin, L., Lashermes, R., Paindavoine, M.: Practical validation of several fault attacks against the Miller algorithm. In: 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (2014)"},{"key":"114_CR20","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-642-29656-7_13","volume-title":"Fault Analysis in Cryptography, Information Security and Cryptography","author":"N El Mrabet","year":"2012","unstructured":"El Mrabet, N., Page, D., Vercauteren, F.: Fault attacks on pairing-based cryptography. In: Joye, M., Tunstall, M. (eds.) Fault Analysis in Cryptography, Information Security and Cryptography, pp. 221\u2013236. Springer, Berlin (2012)"},{"issue":"1","key":"114_CR21","first-page":"26","volume":"12","author":"S Ghosh","year":"2011","unstructured":"Ghosh, S., Mukhopadhyay, D., Chowdhury, D.R.: Fault attack and countermeasures on pairing based cryptography. Int. J. Comput. Netw. Secur. (IJNS) 12(1), 26\u201333 (2011)","journal-title":"Int. J. Comput. Netw. Secur. (IJNS)"},{"key":"114_CR22","first-page":"149","volume-title":"Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science","author":"G Grewal","year":"2012","unstructured":"Grewal, G., Azarderakhsh, R., Longa, P., Shi, H., Jao, D.: Efficient implementation of bilinear pairings on arm processors. In: Knudsen, L.R., Wu, H. (eds.) Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, pp. 149\u2013165. Springer, Berlin (2012)"},{"key":"114_CR23","unstructured":"Habing, D.: The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits. In: Transactions on Nuclear Science, vol. 39, pp. 1647\u20131653 (1992)"},{"key":"114_CR24","first-page":"18","volume-title":"Pairing, volume 5209 of Lecture Notes in Computer Science","author":"F Hess","year":"2008","unstructured":"Hess, F.: Pairing lattices. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing, volume 5209 of Lecture Notes in Computer Science, pp. 18\u201338. Springer, Berlin (2008)"},{"key":"114_CR25","doi-asserted-by":"crossref","unstructured":"Hess, F., Smart, N., Vercauteren, F.: The eta pairing revisited. In: IEEE Transactions on Information Theory, vol. 52, pp. 4595\u20134602 (2006)","DOI":"10.1109\/TIT.2006.881709"},{"key":"114_CR26","first-page":"385","volume-title":"Algorithmic Number Theory, volume 1838 of Lecture Notes in Computer Science","author":"A Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for tripartite diffie\u2013hellman. In: Bosma, W. (ed.) Algorithmic Number Theory, volume 1838 of Lecture Notes in Computer Science, pp. 385\u2013393. Springer, Berlin (2000)"},{"key":"114_CR27","doi-asserted-by":"crossref","unstructured":"Joux, A.: A new index calculus algorithm with complexity l(1\/4 + o(1)) in very small characteristic. IACR Cryptol. ePrint Arch. 2013, 95 (2013)","DOI":"10.1007\/978-3-662-43414-7_18"},{"key":"114_CR28","volume-title":"Identity-based Cryptography. Cryptology and information security series","author":"M Joye","year":"2009","unstructured":"Joye, M., Neven, G.: Identity-based Cryptography. Cryptology and information security series. IOS Press, Amsterdam (2009)"},{"issue":"6","key":"114_CR29","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/MDT.2007.186","volume":"24","author":"CH Kim","year":"2007","unstructured":"Kim, C.H., Quisquater, J.-J.: Faults, injection methods, and fault attacks. Des. Test Comput., IEEE 24(6), 544\u2013545 (2007)","journal-title":"Des. Test Comput., IEEE"},{"key":"114_CR30","first-page":"168","volume-title":"Cryptology and Network Security, volume 4301 of Lecture Notes in Computer Science","author":"TH Kim","year":"2006","unstructured":"Kim, T.H., Takagi, T., Han, D.-G., Kim, H.W., Lim, J.: Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) Cryptology and Network Security, volume 4301 of Lecture Notes in Computer Science, pp. 168\u2013181. Springer, Berlin (2006)"},{"key":"114_CR31","first-page":"365","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013, volume 8086 of Lecture Notes in Computer Science","author":"R Lashermes","year":"2013","unstructured":"Lashermes, R., Fournier, J., Goubin, L.: Inverting the final exponentiation of tate pairings on ordinary elliptic curves using faults. In: Bertoni, G., Coron, J.-S. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2013, volume 8086 of Lecture Notes in Computer Science, pp. 365\u2013382. Springer, Berlin (2013)"},{"key":"114_CR32","volume-title":"Finite Fields. Number vol. 20, ptie. 1 in Encyclopedia of Mathematics and its Applications.","author":"R Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Number vol. 20, ptie. 1 in Encyclopedia of Mathematics and its Applications. Cambridge University Press, Cambridge (1997)"},{"key":"114_CR33","doi-asserted-by":"crossref","unstructured":"Lubicz, D., Robert, D.: Efficient pairing computation with theta functions. In: Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings, volume 6197 of Lecture Notes in Computer Science, pp. 251\u2013269. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-14518-6_21"},{"key":"114_CR34","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s00145-004-0315-8","volume":"17","author":"V Miller","year":"2004","unstructured":"Miller, V.: The weil pairing and its efficient calculation. J. Cryptol. 17, 235\u2013261 (2004)","journal-title":"J. Cryptol."},{"key":"114_CR35","doi-asserted-by":"crossref","unstructured":"Ozturk, E., Gaubatz, G., Sunar, B.: Tate pairing with strong fault resiliency. In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC \u201907, pp. 103\u2013111. IEEE Computer Society, Washington, DC (2007)","DOI":"10.1109\/FDTC.2007.18"},{"issue":"9","key":"114_CR36","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/TC.2006.134","volume":"55","author":"D Page","year":"2006","unstructured":"Page, D., Vercauteren, F.: A fault attack on pairing-based cryptography. IEEE Trans. Comput. 55(9), 1075\u20131080 (2006)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"114_CR37","doi-asserted-by":"crossref","first-page":"1473","DOI":"10.1587\/transfun.E94.A.1473","volume":"E94-A","author":"JH Park","year":"2011","unstructured":"Park, J.H., Sohn, G.Y., Moon, S.J.: A simplifying method of fault attacks on pairing computation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E94-A(6), 1473\u20131475 (2011)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"114_CR38","first-page":"296","volume-title":"IMA International Conference, volume 7089 of Lecture Notes in Computer Science","author":"M Scott","year":"2011","unstructured":"Scott, M.: On the efficient implementation of pairing-based protocols. In: Chen, L. (ed.) IMA International Conference, volume 7089 of Lecture Notes in Computer Science, pp. 296\u2013308. Springer, Berlin (2011)"},{"key":"114_CR39","doi-asserted-by":"crossref","unstructured":"Scott, M., Benger, N., Charlemagne, M., Dominguez, L., Kachisa, E.: On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves. In: Pairing-Based Cryptography Pairing 2009, volume 5671 of LNCS, pp. 78\u201388. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-03298-1_6"},{"key":"114_CR40","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 84 on Advances in cryptology, pp. 47\u201353. Springer, New York (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"114_CR41","first-page":"290","volume-title":"Information Security Practice and Experience, volume 4991 of Lecture Notes in Computer Science","author":"M Shirase","year":"2008","unstructured":"Shirase, M., Takagi, T., Okamoto, E.: An efficient countermeasure against side channel attacks for pairing computation. In: Chen, L., Mu, Y., Susilo, W. (eds.) Information Security Practice and Experience, volume 4991 of Lecture Notes in Computer Science, pp. 290\u2013303. Springer, Berlin Heidelberg (2008)"},{"key":"114_CR42","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-09494-6","volume-title":"The Arithmetic of Elliptic Curves. Graduate Texts in Mathematics","author":"JH Silverman","year":"2009","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves. Graduate Texts in Mathematics. Springer, Berlin (2009)"},{"key":"114_CR43","doi-asserted-by":"crossref","unstructured":"Trichina, E., Korkikyan, R.: Multi fault laser attacks on protected crt-rsa. In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 75\u201386. IEEE (2010)","DOI":"10.1109\/FDTC.2010.14"},{"issue":"1","key":"114_CR44","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1109\/TIT.2009.2034881","volume":"56","author":"F Vercauteren","year":"2010","unstructured":"Vercauteren, F.: Optimal pairings. IEEE Trans. Inf. Theor. 56 (1), 455\u2013461 (2010)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"114_CR45","first-page":"102","volume-title":"Inscrypt, volume 7537 of Lecture Notes in Computer Science","author":"J Weng","year":"2011","unstructured":"Weng, J., Dou, Y., Ma, C.: Fault attacks against the miller algorithm in hessian coordinates. In: Wu, C., Yung, M., Lin, D. (eds.) Inscrypt, volume 7537 of Lecture Notes in Computer Science, pp. 102\u2013112. Springer, Berlin (2011)"},{"key":"114_CR46","doi-asserted-by":"crossref","unstructured":"Whelan, C., Scott, M.: The Importance of the Final Exponentiation in Pairings when considering Fault Attacks. In: Pairing-Based Cryptography\u2013Pairing 2007, volume 4575 of LNCS, pp. 225\u2013246. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-73489-5_12"},{"key":"114_CR47","first-page":"99","volume-title":"Progress in Cryptology - VIETCRYPT 2006, volume 4341 of Lecture Notes in Computer Science","author":"C Whelan","year":"2006","unstructured":"Whelan, C., Scott, M.: Side channel analysis of practical pairing implementations: Which path is more secure? In: Nguyen, P. Q. (ed.) Progress in Cryptology - VIETCRYPT 2006, volume 4341 of Lecture Notes in Computer Science, pp. 99\u2013114. Springer, Berlin (2006)"},{"key":"114_CR48","unstructured":"Yang, B., Wu, K., Karri, R.: Scan based side channel attack on dedicated hardware implementation of data encryption standard. In: Test Conference 2004, proceedings ITC 2004, pp. 339\u2013344 (2004)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0114-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0114-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0114-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T11:04:45Z","timestamp":1598353485000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0114-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,5]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["114"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0114-5","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,5]]}}}