Power analysis attacks and countermeasures on ηTpairing over binary fields

Tae Hyun Kim, Tsuyoshi Takagi, Dong Guk Han, Howon Kim, Jongin Lim

Research output: Contribution to journalArticle

9 Citations (Scopus)

Abstract

Since many efficient algorithms for implementing pairings have been proposed such as ηTpairing and the Ate pairing, pairings could be used in constraint devices such as smart cards. However, the secure implementation of pairings has not been thoroughly investigated. In this paper, we investigate the security of ηTpairing over binary fields in the context of side-channel attacks. We propose efficient and secure ηTpairing algorithms using randomized projective coordinate systems for computing the pairing.

Original languageEnglish
Pages (from-to)68-79
Number of pages12
JournalETRI Journal
Volume30
Issue number1
DOIs
Publication statusPublished - 2008 Feb 1

Keywords

  • Pairing-based cryptosystems
  • Power analysis
  • Randomized projective coordinate systems
  • Side-channel attacks
  • ηpairing

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Computer Science(all)
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Power analysis attacks and countermeasures on η<sub>T</sub>pairing over binary fields'. Together they form a unique fingerprint.

  • Cite this