Novel Mastrovito Multiplier over GF(2m) Using Trinomial, 2011 Fifth International Conference on Genetic and Evolutionary Computing, pp.237-242, 2011. ,
DOI : 10.1109/ICGEC.2011.63
Differential Power Analysis in the Presence of Hardware Countermeasures, CHES 2000, pp.252-263, 1956. ,
DOI : 10.1007/3-540-44499-8_20
Hardware Implementation of Finite-Field Arithmetic, 2009. ,
Secure-system designers strive to stem data leaks, Communications of the ACM, vol.58, issue.4, pp.18-20, 2015. ,
DOI : 10.1145/2732477
Synthesis of Masking Countermeasures against Side Channel Attacks, Computer Aided Verification, pp.114-130, 2014. ,
DOI : 10.1007/978-3-319-08867-9_8
A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields, IEEE Transactions on Computers, vol.56, issue.2, pp.224-233, 2007. ,
DOI : 10.1109/TC.2007.19
Preneel, and I. Verbauwhede . State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures, HOST, pp.76-87, 2010. ,
A Fast Finite Field Multiplier, Proc. 3rd International Conference on Reconfigurable Computing: Architectures , Tools and Applications, ARC'07, pp.238-246, 2007. ,
DOI : 10.1007/978-3-540-71431-6_22
GF(2/sup K/) multipliers based on Montgomery Multiplication Algorithm, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512), pp.849-52, 2004. ,
DOI : 10.1109/ISCAS.2004.1329405
FIPS PUB 186-3 Federal Information Processing Standards Publication Digital Signature Standard (DSS), 2009. ,
FPGA Implementation of an Efficient Multiplier over Finite Fields GF(2^m), 2005 International Conference on Reconfigurable Computing and FPGAs (ReConFig'05), pp.21-26, 2005. ,
DOI : 10.1109/RECONFIG.2005.18
FPGA designs of parallel high performance GF (2 233 ) multipliers, Proc. International Symposium on Circuits and Systems (ISCAS), pp.268-271, 2003. ,
Guide to Elliptic Curve Cryptography, 2004. ,
Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis, Information Science and Applications, pp.509-516, 2015. ,
DOI : 10.1007/978-3-662-46578-3_60
An efficient reconfigurable multiplier architecture for Galois field GF(2m), Microelectronics Journal, vol.34, issue.10, pp.975-980, 2003. ,
DOI : 10.1016/S0026-2692(03)00172-1
Montgomery multiplication in GF(2 k ). Designs, Codes and Cryptography, pp.57-69, 1998. ,
Introduction to Finite Fields and Their Applications, 1994. ,
DOI : 10.1017/CBO9781139172769
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2007. ,
VLSI Architectures for Computation in Galois Fields, 1991. ,
Using Second-Order Power Analysis to Attack DPA Resistant Software. CHES, LNCS 1956, pp.238-251, 2000. ,
Physically observable cryptography. Theory of Cryptography, Theory of Cryptography Conference (TCC), LNCS 2951, pp.278-296, 2004. ,
DOI : 10.1007/978-3-540-24638-1_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.6299
A high-speed word level finite field multiplier in F 2 m using redundant representation IEEE Transactions on Very Large Scale Integration (VLSI) Systems m ) for cryptographic applications: performance -power consumption security tradeoffs, [23] D. Pamula. Arithmetic operators on GF, pp.1546-1550, 2009. ,
$\textrm{GF}(2^m)$ Finite-Field Multipliers with Reduced Activity Variations, Proc. 4th International Workshop on the Arithmetic of Finite Fields, pp.152-167, 2012. ,
DOI : 10.1007/978-3-642-31662-3_11
A fast parallel implementation of elliptic curve point multiplication over GF(2 m ). Microprocessors and Microsystems, pp.5-6329, 2004. ,
Defend encryption systems against side-channel attacks. EDN network, 2015. ,
Side-channel attacks: new directions and horizons, ECRYPT2 School on Design and Security of Cryptographic Algorithms and Devices, 2011. ,
Efficient Elliptic Curve Point Multiplication Using Digit-Serial Binary Field Operations, IEEE Transactions on Industrial Electronics, vol.60, issue.1, pp.217-225, 2013. ,
DOI : 10.1109/TIE.2012.2186104
Fast and accurate activity evaluation in multipliers, 2008 42nd Asilomar Conference on Signals, Systems and Computers, pp.757-761, 2008. ,
DOI : 10.1109/ACSSC.2008.5074510
URL : https://hal.archives-ouvertes.fr/lirmm-00348084