What about vulnerability to a fault attack of the Miller algorithm during an Identity Based Protocol?

  • Published 2008

Abstract

We complete the study of [16] and [20] about the Miller algorithm. The Miller algorithm is a central step to compute the Weil, Tate and Ate pairings. The aim of this article is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate… (More)

Topics

Cite this paper

@inproceedings{2008WhatAV, title={What about vulnerability to a fault attack of the Miller algorithm during an Identity Based Protocol?}, author={}, year={2008} }