共 16 条
[1]
Dhem J.-F., Koeune F., Leroux P.-A., Mestre P., Quisquater J.-J., Willems J.-L., A practical implementation of the Timing Attack, LNCS, 1820, pp. 175-190, (2000)
[2]
Knuth D.E., The Art of Computer Programming, 2, pp. 441-466, (1981)
[3]
Koc C.K., Analysis of Sliding Window Techniques for Exponentiation, Computers and Mathematics with Applications, 30, 10, pp. 17-24, (1995)
[4]
Kocher P., Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems, LNCS, 1109, pp. 104-113, (1996)
[5]
Kocher P., Jaffe J., Jun B., Differential Power Analysis, LNCS, 1666, pp. 388-397, (1999)
[6]
Mayer-Sommer R., Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards, LNCS, 1965, pp. 78-92, (2000)
[7]
Messerges T.S., Dabbish E.A., Sloan R.H., Power Analysis Attacks of Modular Exponentiation in Smartcards, LNCS, 1717, pp. 144-157, (1999)
[8]
Miller V., Use of Elliptic Curves in Cryptography, LNCS, 218, pp. 417-426, (1986)
[9]
Montgomery P.L., Modular Multiplication without Trial Division, Mathematics of Computation, 44, 170, pp. 519-521, (1985)
[10]
Rivest R.L., Shamir A., Adleman L., A Method for obtaining Digital Signatures and Public-Key Cryptosystems, Comm. ACM, 21, pp. 120-126, (1978)