[1] |
RIVEST R , SHAMIR A , ADLEMAN L . A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1983,26(1): 96-99.
|
[2] |
KOBLITZ N . Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987,48(48): 203-209.
|
[3] |
MILLER V . Use of elliptic curves in cryptography[J]. Lecture Notes in Computer Science, 1985,218(1): 417-426.
|
[4] |
SAQIB N , . Key exchange protocol for WSN resilient against man in the middle attack[C]// IEEE International Conference on Advances in Computer Applications. 2017: 265-269.
|
[5] |
YEH H L , CHEN T H , SHIH W K . Robust smart card secured authentication scheme on SIP using elliptic curve cryptography[J]. Computer Standards &Interfaces, 2014,36(2): 397-402.
|
[6] |
SHENTU Q C , YU J P . A blind-mixing scheme for bitcoin based on an elliptic curve cryptography blind digital signature algorithm[J]. Computer Science, 2015: 1-17.
|
[7] |
GUERON S , KRASNOV V . Fast prime field elliptic-curve cryptography with 256-bit primes[J]. Journal of Cryptographic Engineering, 2015,5(2): 141-151.
|
[8] |
IZU T , TAKAGI T . Exceptional procedure attack on elliptic curve cryptosystems[C]// International Workshop on Public Key Cryptography-pkc. 2003: 224-239.
|
[9] |
MATHER L , OSWALD E . Pinpointing side-channel information leaks in Web applications[J]. Journal of Cryptographic Engineering, 2012,2(3): 161-177.
|
[10] |
KOCHER P , . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other system[C]// International Cryptology Conference on Advances in Cryptology. 1996: 104-113.
|
[11] |
MESSERGES T . Using second-order power analysis to attack DPA resistant software[J]. Springer Berlin Heidelberg, 2000,1965: 238-251.
|
[12] |
王敏, 吴震 . 抗 SPA 攻击的椭圆曲线 NAF 标量乘实现算法[J]. 通信学报, 2012,33(S1): 228-232.
|
|
WANG M , WU Z . Algorithm of NAF scalar multiplication on ECC against SPA[J]. Journal on Communications, 2012,33(S1): 228-232.
|
[13] |
MAMIYA H , MIYAJI A , MORIMOTO H . Efficient countermeasures against RPA,DPA,and SPA[J]. Springer Berlin Heidelberg, 2014,3156: 343-356.
|
[14] |
MISHRA P , DIMITROV V . Efficient quintuple formulas for elliptic curves and efficient scalar multiplication using multibase number representation[C]// International Conference on Information Security. 2007: 390-406.
|
[15] |
DANGER J , GUILLEY S , HOOGVORST P ,et al. Improving the big mac attack on elliptic curve cryptography[J]. Springer Berlin Heidelberg, 2016: 374-386.
|
[16] |
LI L , LI S . High-performance pipelined architecture of elliptic curve scalar multiplication over GF(2m)[J]. IEEE Transactions on Very Large Scale Integration Systems, 2016,24(4): 1223-1232.
|
[17] |
DUBEUF J , HELY D , BEROULLE V . ECDSA passive attacks,leakage sources,and common design mistakes[J]. ACM Transactions on Design Automation of Electronic Systems, 2016,21(2): 1-24.
|
[18] |
LIU Z , HUANG X , HU Z ,et al. On emerging family of elliptic curves to secure Internet of Things:ECC comes of age[J]. IEEE Transactions on Dependable & Secure Computing, 2017,14(3): 237-248.
|
[19] |
MELONI N , HASAN M . Efficient double bases for scalar multiplication[J]. IEEE Transactions on Computers, 2015,64(8): 2204-2212.
|
[20] |
CHO S , GWAL S , CHANG H K ,et al. Faster elliptic curve arithmetic for triple-base chain by reordering sequences of field operations[J]. Multimedia Tools &Applications, 2016: 1-13.
|
[21] |
PUROHIT G , RAWAT A . Elliptic curve point multiplication using MBNR and point halving[J]. International Journal of Advanced Networking & Applications, 2012: 1329-1337.
|
[22] |
PAAR C , PELZL J . Understanding cryptography[J]. Springer Berlin Heidelberg, 2010: 519-551.
|
[23] |
HASAN AE , REYHANIMASOLEH A . New regular radix-8 scheme for elliptic curve scalar multiplication without pre-computation[J]. IEEE Transactions on Computers, 2013,64(2): 438-451.
|
[24] |
BERNSTEIN D , CHUENGSATIANSUP C , LANGE T . Double-base scalar multiplication revisited[R]. IACR Cryptology ePrint Archive, 2017: 1-38.
|
[25] |
O’FLYNN C , CHEN Z . ChipWhisperer:an open-source platform for hardware embedded security research[C]// International Workshop on Constructive Side-Channel Analysis and Secure Design. 2014: 243-260.
|