{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T16:05:29Z","timestamp":1649001929218},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2014]]},"DOI":"10.1109\/tc.2014.2339824","type":"journal-article","created":{"date-parts":[[2014,7,17]],"date-time":"2014-07-17T18:26:59Z","timestamp":1405621619000},"page":"1-1","source":"Crossref","is-referenced-by-count":5,"title":["Fault Attacks on Pairing-Based Protocols: Revisited"],"prefix":"10.1109","author":[{"given":"SANJIT","family":"CHATTERJEE","sequence":"first","affiliation":[]},{"given":"KORAY","family":"KARABINA","sequence":"additional","affiliation":[]},{"given":"ALFRED","family":"MENEZES","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0313-x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85538-5_6"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4252-7","author":"silverman","year":"1992","journal-title":"Rational Points on Elliptic Curves"},{"key":"ref30","article-title":"Sequences of games: A tool for taming complexity in security proofs","author":"shoup","year":"0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73489-5_12"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/11426639_7","article-title":"Efficient identity-based encryption without random oracles","author":"waters","year":"2005","journal-title":"Adv Cryptology -- EUROCRYPT 2005 LNCS"},{"key":"ref10","first-page":"320","article-title":"Direct chosen ciphertext security from identity-based techniques","author":"boyen","year":"2005","journal-title":"Proc 12th ACM Conf Comput Commun Secur"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/11818175_17","article-title":"Anonymous hierarchical identity-based encryption (without random oracles)","author":"boyen","year":"2006","journal-title":"Adv Cryptology -- CRYPTO 2006 LNCS"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1007\/978-3-540-72540-4_33","article-title":"Simulatable adaptive oblivious transfer","author":"camenisch","year":"2007","journal-title":"Adv Cryptology -- EUROCRYPT 2007 LNCS"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-540-24676-3_13","article-title":"Chosen-ciphertext security from identity-based encryption","author":"canetti","year":"2004","journal-title":"Advances in Cryptology - EUROCRYPT 2004 LNCS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2013.053434"},{"key":"ref15","author":"mrabet","year":"2012","journal-title":"Fault Analysis in Cryptography"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/11761679_27","article-title":"Practical identity-based encryption without random oracles","author":"gentry","year":"2006","journal-title":"Adv Cryptology -- EUROCRYPT 2006 LNCS"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-642-40084-1_7","article-title":"On the function field sieve and the impact of higher splitting probabilities: Application to discrete logarithms in $\\mbox{${\\mathbb {F}}$}_{2^{1971}}$","author":"g\u00f6lo?lu","year":"2013","journal-title":"Advances in Cryptology-CRYPTO 2013 LNCS"},{"key":"ref18","first-page":"126","author":"granger","year":"0","journal-title":"Adv Cryptology -- CRYPTO 2014 LNCS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-09-02198-X"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-55220-5_1","article-title":"A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic: Improvements over FFS in small to medium characteristi","volume":"8441","author":"barbulescu","year":"2014","journal-title":"Advances in Cryptology - EUROCRYPT 2014"},{"key":"ref27","first-page":"51","article-title":"Construction of a hybrid HIBE protocol secure against adaptive attacks","author":"sarkar","year":"2007","journal-title":"Provable Security -- ProvSec 2007 LNCS"},{"key":"ref3","author":"adj","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9078-6"},{"key":"ref29","article-title":"Computing the Tate pairing","author":"scott","year":"0"},{"key":"ref5","first-page":"319","article-title":"Pairing-friendly elliptic curves of prime order","volume":"3897","author":"barreto","year":"2006","journal-title":"SAC 2005 Selected Areas in Cryptography"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"ref2","author":"adj","year":"0"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5091","article-title":"Identity-based cryptography standard (IBCS) #1: Supersingular curve implementations of the BF and BB1 cryptosystems","author":"boyen","year":"2007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04873-4_2"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-540-79263-5_14","article-title":"CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption","author":"kiltz","year":"2008","journal-title":"Topics in Cryptology - CT-RSA 2008"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Advances in Cryptology -CRYPTO LNCS"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/11586821_2","article-title":"Pairing-based cryptography at high security levels","author":"koblitz","year":"2005","journal-title":"Proc Cryptography Coding 10th IMA Int Conf"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_21"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology -CRYPTO LNCS"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_21"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.134"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/7104223\/06857987.pdf?arnumber=6857987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:41:57Z","timestamp":1642005717000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6857987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/tc.2014.2339824","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2014]]}}}