共 11 条
[2]
Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292
[3]
DHEM JF, 1998, CG19981 UCL
[4]
Hachez G, 2001, LECT NOTES COMPUT SC, V1965, P293
[5]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[6]
Kocher P., 1996, LECT NOTES COMPUTER, V1109, P104, DOI DOI 10.1007/3-540-68697-5_9
[7]
MONTGOMERY PL, 1985, MATH COMPUT, V44, P519, DOI 10.1090/S0025-5718-1985-0777282-X
[8]
Schindler W., 2002, Public Key Cryptography. 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002. Proceedings (Lecture Notes in Computer Science Vol.2274), P263
[9]
Schindler W., 2000, Cryptographic Hardware and Embedded Systems - CHES 2000. Second International Workshop. Proceedings (Lecture Notes in Computer Science Vol.1965), P109
[10]
Walter CD, 2001, LECT NOTES COMPUT SC, V2020, P192