C. D. Walter, Exponentiation using Division Chains, IEEE Transactions on Computers, vol.47, issue.7, 1998.
DOI : 10.1109/12.709375

J. Coron, Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (CHES '99), pp.292-302, 1999.
DOI : 10.1007/3-540-48059-5_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695

C. Paul, J. Kocher, B. Jaffe, and . Jun, Differential power analysis, Advances in Cryptology ? CRYPTO '99, pp.388-397, 1999.

C. D. Walter, MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis, Topics in Cryptology ? CT-RSA 2002, pp.53-66, 2002.
DOI : 10.1007/3-540-45760-7_5

K. Okeya, A Multiple Power Analysis Attack against Side Channel Attack Countermeasure MIST, pp.2002-104, 2002.

C. D. Walter, Some Security Aspects of the MIST Randomized Exponentiation Algorithm, Cryptographic Hardware and Embedded Systems ? CHES 2002, pp.276-290, 2003.
DOI : 10.1007/3-540-36400-5_21

P. Fouque and F. Valette, The Doubling Attack ??? Why Upwards Is Better than Downwards, Cryptographic Hardware and Embedded Systems ? CHES 2003, pp.269-280, 2003.
DOI : 10.1007/978-3-540-45238-6_22

URL : https://hal.archives-ouvertes.fr/inria-00563965

E. Oswald and B. Preneel, A Survey on Passive Side-Channel Attacks and their Countermeasures for the NESSIE Public-Key Cryptosystems Public reports of the NESSIE project, 2003.

S. Sim, D. J. Park, and P. Lee, New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm, Information and Communications Security LNCS, vol.3269, pp.291-304, 2004.
DOI : 10.1007/978-3-540-30191-2_23

B. Chevallier-mames, M. Ciet, and M. Joye, Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity, IEEE Transactions on Computers, vol.53, issue.6, pp.760-768, 2004.
DOI : 10.1109/TC.2004.13

J. Courrège and B. Feix, Simple Power Analysis on Exponentiation Revisited, Smart Card Research and Advanced Applications ? CARDIS 2010, pp.65-79, 2010.
DOI : 10.1007/978-3-642-12510-2_6

S. Yen, W. Lien, and C. Chen, Modified Doubling Attack by Exploiting Chosen Ciphertext of Small Order, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.94, issue.10, pp.1981-1990, 2011.
DOI : 10.1587/transfun.E94.A.1981