[1]Koblitz N. Elliptic Curve Cryptosystems[J]. Mathematics of Computation, 1987, 48(177): 203-209. [2]Miller V S. Use of Elliptic Curves in Cryptography[C]//Proc. of CRYPTO’85. [S. l.]: Springer-Verlag, 1986: 417-426. [3]刘 铎, 戴一奇. 计算椭圆曲线上多标量乘的快速算法[J]. 计算机学报, 2008, 31(7): 1131-1137. [4]陈厚友, 马传贵. 椭圆曲线密码中一种多标量乘算法[J]. 软件学报, 2011, 22(4): 782-788. [5]Kocher P. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other System[C]//Proc. of CRYPTO’96. [S. l.]: Springer-Verlag, 1996: 104-113. [6]Kocher P, Jaffe J, Jun Benjamin. Differential Power Analysis[C]// Proc. of CRYPTO’99. [S. l.]: Springer-Verlag, 1999: 388-397. [7]Jean-Sebastien C. Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems[C]//Proc. of CHES’99. [S. l.]: Springer-Verlag, 1999: 292-302. [8]Antipa A, Brown D R L, Menezes A, et al. Validation of Elliptic Curve Public Keys[C]//Proc. of PKC’03. [S. l.]: Springer-Verlag, 2003: 211-233. [9]Biehl I, Meyer B, Muller V. Differential Fault Attacks on Elliptic Curve Cryptosystems[C]//Proc. of CRYPTO’00. [S. l.]: Springer- Verlag, 2000: 131-146. [10]Ciet M, Joye M. Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults[J]. Designs, Codes and Cryptography, 2005, 36(1): 33-43. [11]Blomer J, Otto M, Seifert J P. Sign Change Fault Attacks on Elliptic Curve Cryptosystems[C]//Proc. of FDTC’05. [S. l.]: Springer-Verlag, 2006: 36-42. [12]Yen Sung-Ming, Joye M. Checking Before Output May Not Be Enough Against Fault-based Cryptanalysis[J]. IEEE Transactions on Computers, 2000, 49(9): 967-970. [13]Dominguez-Oviedo A, Hasan M A. Algorithm-level Error Detection for ECSM[R]. Centre for Applied Cryptographic Research, Tech. Rep.: 2009-05, 2009. [14]Ciet M, Joye M, Lauter K, et al. Montgomery. Trading Inversions for Multiplications in Elliptic Curve Cryptography[J]. Designs, Codes and Cryptography, 2006, 39(2): 189-206. [15]Mishra P K, Dimitrov V. Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation[C]//Proc. of the 10th International Conference on Information Security. [S. l.]: Springer-Verlag, 2007: 390-406.
|