References
- N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, no. 177, 1987, pp. 203-209. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- V.S. Miller, "Use of Elliptic Curves in Cryptography," CRYPTO, LNCS, vol. 218, 1986, pp. 417-426.
- L. Batina et al., "An Elliptic Curve Processor Suitable for RFIDTags," IACR Cryptology ePrint Archive, 2008.
- J. Solinas, "Efficient Arithmetic on Koblitz Curves," Designs, Codes and Cryptography, vol. 19, 2000, pp. 195-249. https://doi.org/10.1023/A:1008306223194
- W. Meier and O. Staffelbach, "Efficient Multiplication on Certain Nonsupersingular Elliptic Curves," CRYPTO, LNCS, vol. 740, 1992, pp. 333-344.
- N. Koblitz, "CM-Curves with Good Cryptographic Properties," CRYPTO, LNCS, vol. 576, 1991, pp. 279-287.
- NIST FIPS 186-2, Recommended Elliptic Curves for Federal Government Use, Appendix to FIPS 186-2, National Institute of Standards and Technology, 2000.
- P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis," CRYPTO, LNCS, vol. 1666, 1999, pp. 388-397.
- J. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems," CHES, LNCS, vol. 1717, 1999, pp. 292-302.
- M. Anwar Hasan, "Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems," CHES, LNCS, vol. 1965, 2000, pp. 93-108.
- B. Mames, M. Ciet, and M. Joye, "Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity," IEEE Trans. Computers, vol. 53, no. 6, 2004, pp. 760-768. https://doi.org/10.1109/TC.2004.13
- H. Mamiya, A. Miyaji, and H. Morimoto, "Secure Elliptic Curve Exponentiation against RPA, ZPA, DPA, and SPA," IEICE Trans. Fundamentals, vol. E89-A, no. 8, 2006, pp. 2207-2215. https://doi.org/10.1093/ietfec/e89-a.8.2207
- P. Montgomery, "Speeding the Pollard and Elliptic Curve Methods for Factorizations," Mathematics of Computation, vol. 48, 1987, pp. 243-264. https://doi.org/10.1090/S0025-5718-1987-0866113-7
- K. Okeya, T. Takagi, and C. Vuillaume, "Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks," ACISP, LNCS, vol. 3574, 2005, pp. 218-229.
- S.M. Yen and M. Joye, "Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis," IEEE Trans. Computers, vol. 49, 2000, pp. 967-970. https://doi.org/10.1109/12.869328
- A. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer, 1993.
- M. Joye and M. Tunstall, "Exponent Recoding and Regular Exponentiation Algorithms," AfricaCrypt., LNCS, vol. 5580, 2009, pp. 334-349.
- T. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software," CHES, LNCS, vol. 1965, 2000, pp. 238-251.
- P. Fouque and F. Valette, "The Doubling Attack - Why Upwards Is Better Than Downwards," CHES, LNCS, vol. 2779, 2003, pp. 269-280.
- L. Goubin, "A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems," PKC, LNCS, vol. 2567, 2003, pp. 199-210.
- T. Akishita and T. Takagi, "Zero-value Point Attacks on Elliptic Curve Cryptosystem," ISC, LNCS, vol. 2851, 2003, pp. 218-233.
- IEEE Std. P1363, IEEE P1363: IEEE Standard Specifications for Public-Key Cryptography, IEEE, 2000.
- J. Coron, D. M'Raihi, and C. Tymen, "Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves," SAC, LNCS, vol. 2259, 2001, pp. 151-164.
- P.C. Kocher, "Timing Attacks on Implementations of Diffie- Hellman, RSA, DSS, and Other Systems," CRYPTO, LNCS, vol. 1109, 1996, pp. 104-113.
- P. Fouque and F. Valette, "The Doubling Attack - Why Upwards Is Better Than Downwards," CHES, LNCS, vol. 2779, 2003, pp. 269-280.