Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms, Selected Areas in Cryptography, pp.110-125, 2007. ,
DOI : 10.1007/978-3-540-77360-3_8
Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems -CHES 2004, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity, IEEE Transactions on Computers, vol.53, issue.6, pp.760-768, 2004. ,
DOI : 10.1109/TC.2004.13
Resistance against differential power analysis for elliptic curve cryptosystems New Directions in cryptography, Cryptographic Hardware and Embedded Systems -CHES 1999, pp.292-302, 1976. ,
Design of an efficient public-key cryptographic library for RISCbased smart cards Fouque and F. Valette. The Doubling Attack -why upwards is better than downwards, Cryptographic Hardware and Embedded Systems -CHES 2003, volume 2779 of Lecture Notes in Computer Science, pp.269-280, 1998. ,
Mutual Information Analysis, Cryptographic Hardware and Embedded Systems CHES 2008, pp.426-442, 2008. ,
DOI : 10.1007/978-3-540-85053-3_27
Analysing and comparing Montgomery multiplication algorithms Differential Power Analysis, Advances in Cryptology -CRYPTO '99, volume 1666 of Lecture Notes in Computer ScienceKoc96] P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems Advances in Cryptology -CRYPTO '96, pp.26-33, 1996. ,
Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985. ,
DOI : 10.1090/S0025-5718-1985-0777282-X
Handbook of Applied Cryptography Theoretical and practical aspects of mutual information based side channel analysis, Applied Cryptography and Network Security, pp.499-518, 1996. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices, Lecture Notes in Computer Science Lecture Notes in Computer Science, vol.51, issue.5, pp.253-267, 2005. ,
DOI : 10.1007/11802839_42