Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks, Security and Privacy in Ad-Hoc and Sensor Networks ? ESAS 2006, pp.6-17, 2006. ,
DOI : 10.1007/11964254_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.2791
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems ? CHES'99, First International Workshop Proceedings, volume 1717 of Lecture Notes in Computer Science, pp.292-302, 1999. ,
DOI : 10.1007/3-540-48059-5_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695
Securing the Elliptic Curve Montgomery Ladder against Fault Attacks, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.46-50, 2009. ,
DOI : 10.1109/FDTC.2009.35
Strong Authentication for RFID Systems Using the AES Algorithm, Cryptographic Hardware and Embedded Systems ? CHES 2004, 6th International Workshop Proceedings, pp.357-370, 2004. ,
DOI : 10.1007/978-3-540-28632-5_26
ECC Processor with Low Die Size for RFID Applications, 2007 IEEE International Symposium on Circuits and Systems, 2007. ,
DOI : 10.1109/ISCAS.2007.378271
Montgomery Exponentiation with no Final Subtractions: Improved Results, Cryptographic Hardware and Embedded Systems ? CHES 2000, Second International Workshop, pp.91-100, 1718. ,
DOI : 10.1007/3-540-44499-8_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.3181
Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core, 9th EUROMICRO Conference on Digital System Design (DSD'06), pp.577-583, 2006. ,
DOI : 10.1109/DSD.2006.40
Guide to Elliptic Curve Cryptography, 2004. ,
ECC Is Ready for RFID ??? A Proof in Silicon, Selected Areas in Cryptography, 15th International Workshop, 2008. ,
DOI : 10.1007/978-3-540-28632-5_7
An ECDSA Processor for RFID Authentication, Proceedings, Lecture Notes in Computer Science, 2010. ,
DOI : 10.1007/978-3-642-16822-2_16
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks, Lecture Notes in Computer Science, vol.2551, pp.296-313, 2002. ,
DOI : 10.1007/3-540-36231-2_24
The Montgomery Powering Ladder, Cryptographic Hardware and Embedded Systems ? CHES 2002, 4th International Workshop, pp.291-302, 2002. ,
DOI : 10.1007/3-540-36400-5_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.1502
The Montgomery inverse and its applications, IEEE Transactions on Computers, vol.44, issue.8, pp.1064-1065, 1995. ,
DOI : 10.1109/12.403725
Cryptography for Ultra-Low Power Devices, 2006. ,
Low Power AES Hardware Architecture for Radio Frequency Identification, First International Workshop on Security Proceedings, volume 4266 of Lecture Notes in Computer Science, pp.353-363, 2006. ,
DOI : 10.1007/11908739_25
Differential Power Analysis Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference Proceedings, volume 1666 of Lecture Notes in Computer Science, pp.388-397, 1999. ,
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? In Workshop on RFID Security, 2006. ,
Elliptic-Curve-Based Security Processor for RFID, IEEE Transactions on Computers, vol.57, issue.11, pp.1514-1527, 2008. ,
DOI : 10.1109/TC.2008.148
Power Analysis Attacks ? Revealing the Secrets of Smart Cards, 2007. ,
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains, Cryptology ePrint Archive Report, vol.216, 2006. ,
A scalable dual-field elliptic curve cryptographic processor, IEEE Transactions on Computers, vol.52, issue.4, pp.449-460, 2003. ,
DOI : 10.1109/TC.2003.1190586
Generalized mersenne numbers, 1999. ,
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices, Information Security Applications, pp.92-106, 2011. ,
DOI : 10.1007/978-3-642-17955-6_7
Is Elliptic-Curve Cryptography Suitable for Small Devices? In Workshop on RFID and Lightweight Crypto, pp.78-91, 2005. ,
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis, IEEE Transactions on Computers, pp.967-970, 2000. ,