共 35 条
- [1] Koblitz N., Elliptic curve cryptosystems, Math. Comput., 48, 177, pp. 203-209, (1987)
- [2] Miller V.S., Use of elliptic curves in cryptography, Advances in Cryptology - CRYPTO'85, 218, pp. 417-426, (1985)
- [3] Avanzi R., Cohen H., Doche C., Frey G., Lange T., Nguyen K., Vercauteren F., Handbook of Elliptic and Hyperelliptic Curve Cryptography, (2005)
- [4] Blake I.F., Seroussi G., Smart N.P., Advances in Elliptic Curve Cryptography, 317, (2005)
- [5] Meloni N., New point addition formulæ for ECC applications, Arithmetic of Finite Fields (WAIFI 2007), 4547, pp. 189-201, (2007)
- [6] Goundar R.R., Joye M., Miyaji A., Co-Z addition formulæ and binary ladders on elliptic curves, Cryptographic Hardware and Embedded Systems - CHES 2010, 6225, pp. 65-79, (2010)
- [7] Venelli A., Dassance F., Faster side-channel resistant elliptic curve scalar multiplication, Contemp. Math., 521, pp. 29-40, (2010)
- [8] Rivain M., Fast and regular algorithms for scalar multiplication over elliptic curves, Cryptology ePrint Archive, (2011)
- [9] Kocher P.C., Jaffe J., Jun B., Differential power analysis, Advances in Cryptology - CRYPTO '99, 1666, pp. 388-397, (1999)
- [10] Yen S.M., Joye M., Checking before output may not be enough against fault-based cryptanalysis, IEEE Trans. Comput., 49, 9, pp. 967-970, (2000)