1 |
P. Kocher, "Timing Attacks on Implementation of Diffie-Hellman, RSA, DSS, and Other Systems," CRYPTO'96, LNCS 1109, pp. 104-113, 1996.
|
2 |
J. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," CHES'99, LNCS 1717, pp. 292-302, 1999.
|
3 |
T. Messerges, E. Dabbis, and R. Sloan, "Power analysis attacks of modular exponentiation in smartcard," CHES'99, LNCS 1717, pp. 144-157, 1999.
|
4 |
N. Koblitz, "Elliptic curve cryptosystem," Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
DOI
|
5 |
M. Joye and S. M. Yen, "The Montgomery Powering Ladder," CHES'02, LNCS 2523, pp. 291-302, 2002.
|
6 |
G. Reitwiesner, "Binary arithmetic," Advances in Computers, pp. 231-308, 1960.
|
7 |
H. Ryu, S. Cho, T. Kim, C. Kim, and S. Hong, "A new scalar recoding method against side channel attacks," Journal of The Korea Institute of Information Security & Cryptology(JKIISC), 26(3), pp. 587-601, 2016.
DOI
|
8 |
D. Hankerson, A. Menezes, and S. Vanstone, "Guide to elliptic curve cryptography," Springer Professional Computing, Springer-Verlag, New York, 2004.
|
9 |
S. Mangard, E. Oswald, and T. Popp, Power Analysis attacks-Revealing the secrets of smart cards, Springer, pp. 136-150, 2007.
|