Highly Regular Right-to-Left Algorithms for Scalar Multiplication
暂无分享,去创建一个
[1] Marc Joye,et al. Trading Inversions for Multiplications in Elliptic Curve Cryptography , 2006, Des. Codes Cryptogr..
[2] Daniel M. Gordon,et al. A Survey of Fast Exponentiation Methods , 1998, J. Algorithms.
[3] Martijn Stam,et al. On Montgomery-Like Representationsfor Elliptic Curves over GF(2k) , 2003, Public Key Cryptography.
[4] Tanja Lange,et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .
[5] Ricardo Dahab,et al. Improved Algorithms for Elliptic Curve Arithmetic in GF(2n) , 1998, Selected Areas in Cryptography.
[6] Frederik Vercauteren,et al. Fault and Side-Channel Attacks on Pairing Based Cryptography , 2004, IACR Cryptology ePrint Archive.
[7] Alfred Menezes,et al. Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.
[8] Nigel P. Smart,et al. A comparison of different finite fields for use in elliptic curve cryptosystems , 2000 .
[9] Tsuyoshi Takagi,et al. A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks , 2002, Public Key Cryptography.
[10] Christof Paar,et al. Efficient Algorithms for Elliptic Curve Cryptosystems , 1997, CRYPTO.
[11] Marc Joye,et al. Topics in Cryptology — CT-RSA 2003 , 2003 .
[12] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[13] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[14] Kunio Kobayashi,et al. Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic , 1999, EUROCRYPT.
[15] C. D. Walter,et al. Sliding Windows Succumbs to Big Mac Attack , 2001, CHES.
[16] Marc Joye,et al. Weierstraß Elliptic Curves and Side-Channel Attacks , 2002, Public Key Cryptography.
[17] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[18] Lawrence C. Washington. Review of "Handbook of Elliptic and Hyperelliptic Curve Cryptography by H. Cohen and G. Frey", Chapman & Hall/CRC, 2006, 1-58488-518-1 , 2008, SIGA.
[19] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[20] Tsuyoshi Takagi,et al. The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks , 2003, CT-RSA.
[21] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[22] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[23] K. Brown,et al. Graduate Texts in Mathematics , 1982 .
[24] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[25] Alfred Menezes,et al. Field inversion and point halving revisited , 2004, IEEE Transactions on Computers.
[26] P. Kocher,et al. Differential power analysis, advances in cryptology-CRYPTO'99 , 1999 .
[27] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[28] Alain Durand. Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card , 1998, CARDIS.
[29] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[30] Marc Joye,et al. Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis , 2000, IEEE Trans. Computers.
[31] Kouichi Itoh,et al. Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA , 2002, CHES.
[32] Bodo Möller,et al. Securing Elliptic Curve Point Multiplication against Side-Channel Attacks , 2001, ISC.
[33] Alfred Menezes,et al. Software Implementation of the NIST Elliptic Curves Over Prime Fields , 2001, CT-RSA.
[34] Kouichi Sakurai,et al. Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications , 2000, Public Key Cryptography.
[35] David Naccache,et al. Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.
[36] M. Stam,et al. Speeding up subgroup cryptosystems , 2003 .
[37] Kouichi Itoh,et al. Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems , 2004, CARDIS.
[38] C.K. Koc,et al. Architectures for unified field inversion with applications in elliptic curve cryptography , 2002, 9th International Conference on Electronics, Circuits and Systems.
[39] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[40] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[41] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[42] Bart Preneel,et al. On the Performance of Signature Schemes Based on Elliptic Curves , 1998, ANTS.
[43] Christof Paar,et al. Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms , 1998, CRYPTO.
[44] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[45] W. Nichols. RESEARCH AND APPLICATION. , 1919, Science.
[46] Atsuko Miyaji,et al. Efficient Countermeasures against RPA, DPA, and SPA , 2004, CHES.
[47] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[48] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[49] Gordon B. Agnew,et al. An Implementation of Elliptic Curve Cryptosystems Over F2155 , 1993, IEEE J. Sel. Areas Commun..
[50] Jean-Sébastien Coron,et al. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.
[51] Ricardo Dahab,et al. Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation , 1999, CHES.
[52] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[53] Nigel P. Smart,et al. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .
[54] Marc Joye,et al. The Montgomery Powering Ladder , 2002, CHES.
[55] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[56] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2003 , 2003, Lecture Notes in Computer Science.
[57] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[58] Chae Hoon Lim,et al. Fast Implementation of Elliptic Curve Arithmetic in GF(pn) , 2000, Public Key Cryptography.
[59] Ian F. Blake,et al. Advances in Elliptic Curve Cryptography: Frontmatter , 2005 .
[60] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[61] Chae Hoon Lim,et al. A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks , 2004, ACISP.
[62] Nicolas Thériault,et al. SPA Resistant Left-to-Right Integer Recodings , 2005, IACR Cryptol. ePrint Arch..
[63] Frédéric Valette,et al. The Doubling Attack - Why Upwards Is Better than Downwards , 2003, CHES.
[64] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[65] Kristin E. Lauter,et al. Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation , 2003, CT-RSA.
[66] Berk Sunar,et al. Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults , 2008, IEEE Transactions on Computers.
[67] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[68] Hilarie K. Orman,et al. Fast Key Exchange with Elliptic Curve Systems , 1995, CRYPTO.