共 15 条
[2]
Bajard JC, 2004, LECT NOTES COMPUT SC, V3156, P62
[3]
Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:123-140
[4]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[5]
Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292
[6]
A general approach for improving RNS Montgomery exponentiation using pre-processing
[J].
2011 20TH IEEE SYMPOSIUM ON COMPUTER ARITHMETIC (ARITH-20),
2011,
:195-204
[7]
Joye M, 2002, LECT NOTES COMPUT SC, V2523, P291
[8]
Kawamura S, 2000, LECT NOTES COMPUT SC, V1807, P523
[9]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[10]
Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104