[1] Kocher P.Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS,and Other Systems[C]//Proc.of the 16th Annual International Cryptology Conference on Advances in Cryptology.London,UK:Springer-Verlag,1996:104-113.
[2] Kocher P,Jaffe J,Jun B.Differential Power Analysis[C]//Proc.of the 19th Annual International Cryptology Conference on Advances in Cryptology.London,UK:Springer-Verlag,1999:388-397.
[3] Oswald E.Enhancing Simple Power-analysis Attacks on Elliptic Curve Cryptosystems[C]//Proc.of the 4th International Workshop Cryptographic Hardware and Embedded Systems.Redwood Shores,USA:[s.n.],2002:82-97.
[4] Gandolfi K,Mourtel C,Olivier F.Electromagnetic Analysis:Concrete Results[C]//Proc.of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems.Paris,France:ACM Press,2001:251-261.〖HJ0.8mm〗
[5] Chari S,Rao J R,Rohatgi P.TemplateAttacks[C]//Proc.of the 4th International Workshop on Cryptographic Hardware and Embedded Systems.San Francisco,USA:ACM Press,2002:13-28.
[6] Biehl I,Meyer B,Müller V.Differential Fault Attacks on Elliptic Curve Cryptosystems[C]//Proc.of the 20th Annual International Cryptology Conference on Advances in Cryptology.London,UK:Springer-Verlag,2000:131-146.
[7] Ciet M,Joye M.Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults[J].Designs,Codes and Cryptography,2005,36(1):33-43.
[8] Dominguez-Oviedo A,Hasan M A,Ansari B.Fault-based Attack on Montgomery’s Ladder Algorithm[J].Journal of Cryptology,2011,24(2):346-374.
[9] Cohen H,Frey G,Avanzi R,et al.Handbook of Elliptic and Hyper Elliptic Curve Cryptography[M].[S.l.]:Chapman and Hall,2005.
[10] Boneh D,Lynn B,Shacham H.Short Signatures from the Weil Pairing[C]//Proc.of the 7th International Conference on the Theory and Application of Cryptology and Information Security.London,UK:Springer-Verlag,2001:514-532.
[11] Hankerson D,Menezes A J,Vanstone S.Guide to Elliptic Curve Cryptography[M].New York,USA:Springer-Verlag,2004.
[12] Jeong E.Isomorphism Classes of Elliptic Curves Over Finite Fields with Characteristic 3[J].Journal of the Chungcheong Mathematical Society,2009,22(3):207-213.
[13] Antipa A,Brown D,Menezes A,et al.Validation of Elliptic Curve Public Keys[C]//Proc.of PKC’03.Berlin,Germany:Springer-Verlag,2003:211-223.
编辑 陆燕菲 |