Guide to Elliptic Curve Cryptography, 2004. ,
Hybrid algorithm for the computation of the matrix polynomial I, IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, pp.377-380, 1995. ,
An algorithm for modular exponentiation, Information Processing Letters, vol.66, issue.3, pp.155-159, 1998. ,
DOI : 10.1016/S0020-0190(98)00044-1
Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains, Proc. 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), ser. LNCS, pp.59-78, 2005. ,
DOI : 10.1007/11593447_4
URL : https://hal.archives-ouvertes.fr/lirmm-00106638
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography, Proc. 7th International Conference on Cryptology (INDOCRYPT), ser, pp.335-348, 2006. ,
DOI : 10.1007/11941378_24
URL : https://hal.archives-ouvertes.fr/lirmm-00125442
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System, Proc. 8th International Conference on Progress in Cryptology (IN- DOCRYPT), ser. LNCS, pp.351-360, 2007. ,
DOI : 10.1007/978-3-540-77026-8_27
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication, Proc. 8th International Conference on Progress in Cryptology (INDOCRYPT), ser. LNCS, pp.167-182, 2007. ,
DOI : 10.1007/978-3-540-77026-8_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.8916
A Tree-Based Approach for Computing Double-Base Chains, Proc. 13th Australasian Conference on Information Security and Privacy, ser. LNCS, pp.433-446, 2008. ,
DOI : 10.1007/978-3-540-70500-0_32
The double-base number system and its application to elliptic curve cryptography, Mathematics of Computation, vol.77, issue.262, pp.1075-1104, 2008. ,
DOI : 10.1090/S0025-5718-07-02048-0
URL : https://hal.archives-ouvertes.fr/lirmm-00341742
A new architecture for FPGA based implementation of conversion of binary to double base number system (DBNS) using parallel search technique, ACM SIGARCH Computer Architecture News, vol.39, issue.5, pp.12-18, 2011. ,
DOI : 10.1145/2093339.2093343
Hardware implementation of DBNS recoding for ECC processor, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, pp.1129-1133, 2010. ,
DOI : 10.1109/ACSSC.2010.5757580
URL : https://hal.archives-ouvertes.fr/inria-00536587
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation, Proc. 10th International Conference on Information COMPARISON OF SCALAR MULTIPLICATION METHODS ,
DOI : 10.1007/978-3-540-75496-1_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.75.9351
Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields, 2007. ,
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication, Proc. Public Key Cryptography (PKC), ser. LNCS, pp.443-462, 2009. ,
DOI : 10.1007/978-3-642-00468-1_25
Fast scalar multiplication in ECC using the multi base number system, International Journal of Computer Science Issues, vol.8, issue.1, pp.131-137, 2011. ,
Optimized approach for computing multibase chains, Proc. 7th International Conference on Computational Intelligence and Security (CIS). IEEE, pp.964-968, 2011. ,
Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems, IEEE Transactions on Computers, vol.60, issue.2, pp.254-265, 2011. ,
DOI : 10.1109/TC.2010.138
URL : https://hal.archives-ouvertes.fr/lirmm-00595207
Elliptic curve point multiplication using MBNR and point halving, International Journal of Advanced Networking and Applications, vol.3, issue.5, pp.1329-1337, 2012. ,
Elements of Automata Theory. Cambridge, 2009, ch. Prologue: M. Pascal's Division Machine, pp.1-6 ,
An Algorithm for Exact Division, Journal of Symbolic Computation, vol.15, issue.2, pp.169-180, 1993. ,
DOI : 10.1006/jsco.1993.1012
Some Optimizations of Hardware Multiplication by Constant Matrices, IEEE Transactions on Computers, vol.54, issue.10, pp.1271-1282, 2005. ,
DOI : 10.1109/TC.2005.168
URL : https://hal.archives-ouvertes.fr/lirmm-00113092
Versatile processor for GF(pm) arithmetic for use in cryptographic applications, 26] S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, pp.253-264, 2007. ,
DOI : 10.1049/iet-cdt:20070077
Advances in Elliptic Curve Cryptography, ser Lecture Note Series, pp.69-86, 2005. ,
Advances in Elliptic Curve Cryptography, ser Lecture Note, ch. Defenses Against Side-Channel Analysis, pp.87-100, 2005. ,
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem, Journal of Computers, vol.2, issue.10, pp.52-62, 2007. ,
DOI : 10.4304/jcp.2.10.52-62
URL : https://hal.archives-ouvertes.fr/lirmm-00174648
Optimizing elliptic curve scalar multiplication for small scalars, Proc. Mathematics for Signal and Information Processing, pp.74-440, 2009. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00424282
Setting speed records with the (fractional) multibase non-adjacent form method for efficient elliptic curve scalar multiplication, Cryptology ePrint Archive, 2008. ,
New multibase non-adjacent form scalar multiplication and its application to elliptic curve cryptosystems, IACR Eprint, 2008. ,
Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201, Proc. Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, pp.61-72, 1999. ,
DOI : 10.1007/3-540-48059-5_7