共 50 条
- [31] Overview of Scalar Multiplication in Elliptic Curve Cryptography [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2670 - 2673
- [32] Key Bit-Dependent Side-Channel Attacks on Protected Binary Scalar Multiplication [J]. APPLIED SCIENCES-BASEL, 2018, 8 (11):
- [36] Machine Learning Analysis for Side-Channel Attacks over Elliptic Curve Cryptography [J]. 2021 IEEE CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (IEEE CHILECON 2021), 2021, : 266 - 272
- [37] Side-channel attacks in ECC: A general technique for varying the parametrization of the elliptic curve [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 220 - 229
- [38] Side Channel Attack Resistant Architecture for Elliptic Curve Cryptography [J]. 2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
- [39] SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem [J]. 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 785 - 790
- [40] Stronger and Faster Side-Channel Protections for CSIDH [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2019, 2019, 11774 : 173 - 193