参考文献 [1]KOBLITZ N.Elliptic Curve Cryptosystems[J].Mathematics of Computation,1987,177(48):203-209. [2]MILLER V S.Use of Elliptic Curves in Cryptography[C]//Proceedings of Advances in Cryptology-CRYPTO’85.Berlin,Germany:Springer,1985:417-426. [3]KNUTH D E.The Art of Computer Programming/Seminumerical Algorithms[M].Reading,USA:Addison-Wesley,2002. [4]KOCHER P C.Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS,and Other Systems[C]//Proceedings of Advances in Cryptology-CRYPTO’96.Berlin,Germany:Springer,1996:104-113. [5]QUISQUATER J J,SAMYDE D.Simple Electromagnetic Analysis for Smart Cards:New Results[C]//Proceedings of RSTC’00.Berlin,Germany:Springer,2000:125-136. [6]WU K K,LI H Y,CHEN T D,et al.Simple Power Analysis on Elliptic Curve Cryptosystems and Counter-measures:Practical Work[C]//Proceedings of ISECS’09.Nanchang,China:[s.n.],2009:21-24. [7]MONTGOMERY P L.Speeding the Pollard and Elliptic Curve Algorithms for Factorizations[J].Mathematics of Computation,1987,177(48):243-264. [8]CORON J S.Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems[C]//Pro-ceedings of CHES’99.Germany,Berlin:Springer,1999:292-302. [9]BRIER E,JOYE M.Weierstrass Elliptic Curves and Side-channel Attacks[C]//Proceedings of PKC’02.Germany,Berlin:Springer,2002:335-345. [10]JOYE M,QUISQUATER J J.Hessian Elliptic Curves and Side-channel Attacks[C]//Proceedings of Inter-national Workshop on Practice & Theory in Public Key Cryptosystems.Berlin,Germany:Springer,2001:402-410. [11]BILLET O,JOYE M.The Jacobi Model of an Elliptic Curve and Side-channel Analysis[C]//Proceedings of IEEE AAECC’15.Washington D.C.,USA:IEEE Press,2003:34-42. [12]CHEVALLIER B,CIET M,JOVY M.Low-cost Solutions for Preventing Simple Side-channel Analysis:Side-channel Atomicity[J].IEEE Transactions on Computers,2004,53(6):760-768. [13]WU K K,LI H Y,ZHU D J,et al.Efficient Solution to Secure ECC Against Side-channel Attacks[J].Chinese Journal of Electronics,2011,20(3):471-475. [14]AZARDERAKHSH R,KARABINA K.A New Double Point Multiplication Algorithmand Its Application to Binary EllipticCurves with Endomorphisms[J].IEEE Transactions on Computers,2014,63(10):2614-2619. [15]KOCHER P C,JAFFE J,JUN B.Differential Power Analysis[C]//Proceedings of Advances in Cryptology-CRYPTO’99.Berlin,Germany:Springer,1999:388-397. [16]CORON J S.Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems[C]//Proceedings of CHES’99.Washington D.C.,USA:IEEE Press,1999:292-302. [17]MESSERGES T S,DABBISH E A,SLOAN R H.Power Analysis Attacks of Modular Exponentiation in Smartcards[C]//Proceedings of CHES’99.Washington D.C.,USA:IEEE Press,1999:144-157. [18]GOUBIN L.A Refined Power Analysis on Elliptic Curve Cryptosystems[C]//Proceedings of PKC’03.Germany,Berlin:Springer,2003:199-211. [19]AKISHITA T,TAKAGEI T.Zero-value Point Attacks on Elliptic Curve Cryptosystem[C]//Proceedings of ICS’03.Germany,Berlin:Springer,2003:218-233. [20]DUPUY W,KUNZ-JACQUES S.Resistance of Randomized Projective Coordinates Against Power Analysis[C]//Proceedings of CHES’05.Washington D.C.,USA:IEEE Press,2005:1-14. (下转第125页) (上接第119页) [21]GEBOTYS C H,HO S,TIU C C.EM Analysis of Rijndael and ECC on a Wireless Java-based PDA[C]//Proceedings of CHES’05.Washington D.C.,USA:IEEE Press,2005:250-264. [22]FAN J,GIERLICHS B,VERCANTEREN F.To Infinity and Beyond:Combined Attack on ECC Using Points of Low Order[C]//Proceedings of CHES’11.Washington D.C.,USA:IEEE Press,2011:143-159. [23]CHARI S,JUTLA C S,RAO J R,et al.Towards Sound Approaches to Counteract Power-analysis Attacks[C]//Proceedings of Advances in Cryptology-CRYPTO’99.Berlin,Germany:Springer,1999:398-412. [24]CLAVIER C,JPYE M.Universal Exponentiation Algorithm:A First Step Towards Provable SPA-resistance[C]//Proceedings of CHES’01.Washington D.C.,USA:IEEE Press,2001:300-308. [25]TRICHINA E,BELLEZZA A.Implementation of Elliptic Curve Cryptography with Built-in Countermeasures Against Side Channel Attacks[C]//Proceedings of CHES’02.Washington D.C.,USA:IEEE Press,2002:98-113. [26]张金中,寇应展,陈财森,等.二进制方法点乘的椭圆曲线密码故障攻击[J].计算机工程,2011,37(20):100-102. [27]马博,包斯刚,戴显英.智能卡中ECC抗功耗攻击方案的效率改进[J].计算机工程,2010,36(16):113-115. [28]JOYE M,QUISQUATER J J.Protections Against Differential Analysis for Elliptic Curve Cryptography[C]//Proceedings of CHES’01.Washington D.C.,USA:IEEE Press,2001:377-390. [29]王正义,赵俊阁.ECC抗功率分析攻击的等功耗编码算法[J].计算机工程,2012,38(10):111-113. [30]LEE J W,CHUNG S C,CHANG H C.An Efficient Countermeasure Against Correlation Power-analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor[C]//Proceedings of CHES’12.Washington D.C.,USA:IEEE Press,2012:548-564. [31]卢宇,汪学明.超椭圆曲线上斜——Frobenius映射及有效标量乘算法研究[J].计算机工程,2017,43(6):78-83,91. [32]HANKERSON D,MENEZES A,VANSTONE S.Guide to Elliptic Curve Cryptography[M].Germany,Berlin:Springer,2004. [33]SILVERMAN J H.The Arithmetic of Elliptic Curves[M].Germany,Berlin:Springer,2009. [34]邬可可,李慧云,于峰崎.对同步流密码设备的相关性功耗分析攻击[J].高技术通讯,2009,19(11):1142-1147. 编辑索书志 |