Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
暂无分享,去创建一个
[1] Atsuko Miyaji,et al. Efficient Elliptic Curve Exponentiation Using Mixed Coordinates , 1998, ASIACRYPT.
[2] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[3] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[4] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[5] Atsuko Miyaji,et al. Efficient elliptic curve exponentiation , 1997, ICICS.
[6] Kouichi Sakurai,et al. Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack , 2000, INDOCRYPT.
[7] Bimal Roy,et al. Progress in Cryptology —INDOCRYPT 2000 , 2002, Lecture Notes in Computer Science.
[8] Jean-Sébastien Coron,et al. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.
[9] James W. Moore,et al. Institute of Electrical and Electronics Engineers (IEEE) , 2002 .
[10] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[11] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[12] Alfred Menezes,et al. Software Implementation of the NIST Elliptic Curves Over Prime Fields , 2001, CT-RSA.
[13] Kouichi Sakurai,et al. Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications , 2000, Public Key Cryptography.
[14] Nigel P. Smart,et al. Preventing SPA/DPA in ECC Systems Using the Jacobi Form , 2001, CHES.
[15] Kazuo Ohta,et al. Advances in Cryptology — ASIACRYPT’98 , 2002, Lecture Notes in Computer Science.
[16] Marc Joye,et al. Hessian Elliptic Curves and Side-Channel Attacks , 2001, CHES.
[17] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[18] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[19] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .