Preventing SPA/DPA in ECC Systems Using the Jacobi Form
暂无分享,去创建一个
[1] D. Chudnovsky,et al. Sequences of numbers generated by addition in formal groups and new primality and factorization tests , 1986 .
[2] J. Cassels. Lectures on elliptic curves , 1991 .
[3] J. Cassels. LMSST: 24 Lectures on Elliptic Curves , 1991 .
[4] Samir Siksek,et al. Explicit 4-descents on an elliptic curve , 1996 .
[5] E. V. Flynn,et al. Prolegomena to a Middlebrow Arithmetic of Curves of Genus 2: Index rerum et personarum , 1996 .
[6] Atsuko Miyaji,et al. Efficient Elliptic Curve Exponentiation Using Mixed Coordinates , 1998, ASIACRYPT.
[7] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[8] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[9] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[10] Nigel P. Smart,et al. Lattice Attacks on Digital Signature Schemes , 2001, Des. Codes Cryptogr..
[11] Kazuo Ohta,et al. Advances in Cryptology — ASIACRYPT’98 , 2002, Lecture Notes in Computer Science.