1 |
GroBschadl, J., Oswald, E., Page, D., & Tunstall, M, "Side-channel analysis of cryptographic software via early-terminating multiplications," In International Conference on Information Security and Cryptology, pp. 176-192, 2009.
|
2 |
de Groot, W, "A Performance Study of X25519 on Cortex-M3 and M4," Master thesis in Eindhoven University of Technology, 2015.
|
3 |
Hamouda, F. B, "Exploration of efficiency and side-channel security of different implementations of RSA," 2011.
|
4 |
Seo, H., Chen, C. N., Liu, Z., Nogami, Y., Park, T., Choi, J., & Kim, H., "Secure Binary Field Multiplication," In International Workshop on Information Security Applications, pp. 161-173, 2015.
|
5 |
K. MacKay, "ECDH and ECDSA for 8-bit, 32-bit, and 64-bit processors," available for download at https://github.com/kmackay/micro-ecc, 2017.
|
6 |
Comba, P. G., "Exponentiation cryptosystems on the IBM PC," IBM systems journal, vol. 29, no. 4, pp. 526-538, 1990.
DOI
|
7 |
Chen, C. N., "Memory address side-channel analysis on exponentiation," International Conference on Information Security and Cryptology, pp. 421-432, 2014.
|
8 |
Yen, S. M., Lien, W. C., Moon, S. J., Ha, J., "Power analysis by exploiting chosen message and internal collisions-vulnerability of checking mechanism for RSA-decryption," In Mycrypt'05, vol. 3715, pp. 183-1956, 2005.
|
9 |
Miyamoto, A., Homma, N., Aoki, T., Satoh, A., "Chosen-message SPA attacks against FPGA-based RSA hardware implementations," In Field Programmable Logic and Applications, 2008, pp. 35-40, 2008.
|