Huss : a 0.35um CMOS 1.5 GHz Elliptic Curve Public Key Cryptosystem chip, IEEE Proc. 6th International Symposium on Asynchronous Circuits and Systems (ASYNC), pp.188-197, 2000. ,
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2007. ,
Electromagnetic Analysis: Concrete Results, Proc. Cryptographic Hardware and Embedded Systems CHES, pp.251-261, 2001. ,
DOI : 10.1007/3-540-44709-1_21
Advances in Elliptic Curve Cryptography, pp.69-86, 2005. ,
Advances in Elliptic Curve Cryptography, pp.87-100, 2005. ,
Speeding the Pollard and elliptic curve methods of factorization, Mathematics of Computation, vol.48, issue.177, pp.243-264, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866113-7
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem, Journal of Computers, vol.2, issue.10, pp.52-62, 2007. ,
DOI : 10.4304/jcp.2.10.52-62
URL : https://hal.archives-ouvertes.fr/lirmm-00174648
Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985. ,
DOI : 10.1090/S0025-5718-1985-0777282-X
Design and implementation of scalable lowpower Montgomery multiplier, Computer Design: VLSI in Computers and Processors, pp.524-531, 2004. ,
Low power design techniques for a Montgomery modular multiplier. Intelligent Signal Processing and Communication Systems, pp.449-452, 2005. ,
Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic, Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays , FPGA '02, pp.40-49, 2002. ,
DOI : 10.1145/503048.503055
FPGAMontgomery Multiplier Architectures -a Comparison, Proc. 12th Symposium on Field-Programmable Custom Computing Machines (FCCM), pp.279-282, 2004. ,
A Comparison on FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values, 2011 21st International Conference on Field Programmable Logic and Applications, pp.273-276, 2011. ,
DOI : 10.1109/FPL.2011.55
URL : https://hal.archives-ouvertes.fr/inria-00633200
Fast and accurate activity evaluation in multipliers, 2008 42nd Asilomar Conference on Signals, Systems and Computers, pp.757-781, 2008. ,
DOI : 10.1109/ACSSC.2008.5074510
URL : https://hal.archives-ouvertes.fr/lirmm-00348084
$\textrm{GF}(2^m)$ Finite-Field Multipliers with Reduced Activity Variations, 4th International Workshop on the Arithmetic of Finite Fields, pp.152-167, 2012. ,
DOI : 10.1007/978-3-642-31662-3_11
A novel CMOS logic style with data independent power consumption, IEEE International Symposium on Circuits and Systems, pp.1066-1069, 2005. ,
A Dynamic and Differential CMOS Lookup Table with Data Independent Power Consumption for Cryptographic Applications on Chip Cards, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.4, pp.245-251, 2007. ,
DOI : 10.1109/TDSC.2007.70212
A self-timed arithmetic unit for elliptic curve cryptography, Proceedings Euromicro Symposium on Digital System Design. Architectures, Methods and Tools, pp.347-350, 2002. ,
DOI : 10.1109/DSD.2002.1115389
Ultra Low Power Asynchronous Charge Sharing Logic, Journal of Low Power Electronics, vol.8, issue.4, pp.526-534, 2012. ,
DOI : 10.1166/jolpe.2012.1213
An efficient charge recovery logic circuit, IEEE Journal of Solid-State Circuits, vol.31, issue.4, pp.925-933, 1996. ,
DOI : 10.1109/4.499727
Positive feedback in adiabatic logic, Electronics Letters, vol.32, issue.20, pp.1867-1869, 1996. ,
DOI : 10.1049/el:19961272
An efficient CSA architecture for Montgomery modular multiplication, Microprocessors and Microsystems, pp.456-459, 2007. ,
Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics, IEEE Transactions on Computers, vol.59, issue.9, pp.1250-1263, 2010. ,
DOI : 10.1109/TC.2010.104