1 |
N. Koblitz. "Elliptic curve cryptosystems," Mathematics of Computation, Vol. 48, no.177, pp. 203-209, Jan. 1987.
DOI
ScienceOn
|
2 |
V.S. Miller, "Use of elliptic curves in cryptography," CRYPTO'85, LNCS 218, pp. 417-426, 1986.
|
3 |
N. Meloni, "New point addition formulae for ECC Applications," WAIFI'07, LNCS 4547, pp. 189-201. Jun. 2007.
|
4 |
A. Byrne, F. Crowe, W.P. Marnane, N. Meloni, A. Tisserand, and E. Popovici, "SPA resistant elliptic curve cryptosystem using addition chains," International Journal of High Performance Systems Architecture, Vol. 1, no.2, pp. 133-142, Oct. 2007.
DOI
ScienceOn
|
5 |
R.R. Goundar, M. Joye and A. Miyaji, "Co-Z addition formulæ and binary ladders on elliptic curves," In: Mangard, S., Standaert, F-X. (eds.) CHES'10. LNCS 6225, pp. 65-79. Aug. 2010.
|
6 |
J. Lopez and R. Dahab, "Fast multiplication on elliptic curves over GF(2m) without precomputation," CHES'99, LNCS 1717, pp. 316-327, Aug. 1999.
|
7 |
T. Izu and T. Takagi, "A fast parallel elliptic curve multiplication resistant against side channel attacks," PKC'02, LNCS 2274, pp. 280-296, Feb. 2002.
|
8 |
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other Systems," Advances in Cryptology, Proc. CRYPTO'96, pp. 104-113, Aug. 1996.
|
9 |
D. Boneh, R.A. DeMillo and R.J. Lipton, "On the importance of eliminating errors in cryptographic computations," Journal of Cryptology, 2001; Extended abstract in Proc. EUROCRYPT'97, Vol. 14, no. 2, pp. 110-119, May. 1997.
|
10 |
F. Bao, R.H. Deng, Y. Han, A. Jeng, A.D. Narasimbalu and T. Ngair, "Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults," Security Protocols Workshop 1997, LNCS 1361, pp. 115-124, Apl. 1997.
|
11 |
J. Schmidt and C. Herbst, "A Practical Fault attack on Square and Multiply," FDTC'08, IEEE Computer Society, pp. 53-58, Aug. 2008.
|
12 |
P. Fouque and R. Lercier, "Fault Attack on Elliptic Curve with Montgomery Ladder Implementation," FDTC'08, IEEE Computer Society, pp. 92-98, Aug. 2008.
|
13 |
I. Biehl, B. Meyer, and V. Muller. "Differential fault attacks on elliptic curve cryptosystems," CRYPTO'00, LNCS 1880, pp. 131-146, Aug. 2000.
|
14 |
M. Ciet, M. Joye, "Elliptic curve cryptosystems in the presence of permanent and transient faults," Cryptology ePrint Archive, Vol. 36, no. 1, pp. 33-43, Jul. 2005.
|
15 |
J. Blomer, M. Otto, and J. Seifert, "Sign change fault attacks on elliptic curve cryptosystems," FDTC'06, LNCS 4236, pp 36-52, Oct. 2006.
|
16 |
A. Dominguez-Oviedo and M. Anwar Hasan, "Error Detection and Fault Tolerance in ECSM Using Input Randomization," IEEE Trans. Dependable and Secure Computing Vol. 6, no.3, pp. 175-187, Jul. 2009.
DOI
|
17 |
S. Pontarelli, G.C. Cardarilli, M. Re, and A. Salsano. "Error detection in addition chain based ecc point multiplication," IEEE International On-Line Testing Symposium, pp. 192-194, Jun. 2009.
|
18 |
J. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems," Proc. CHES'99, LNCS 1717, pp. 292-302, Aug. 1999.
|