L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks, Security and Privacy in Ad-Hoc and Sensor Networks ? ESAS 2006, pp.6-17, 2006.
DOI : 10.1007/11964254_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.2791

J. Coron, Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems ? CHES'99, First International Workshop Proceedings, volume 1717 of Lecture Notes in Computer Science, pp.292-302, 1999.
DOI : 10.1007/3-540-48059-5_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695

N. Ebeid and R. Lambert, Securing the Elliptic Curve Montgomery Ladder against Fault Attacks, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.46-50, 2009.
DOI : 10.1109/FDTC.2009.35

M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, Cryptographic Hardware and Embedded Systems ? CHES 2004, 6th International Workshop Proceedings, pp.357-370, 2004.
DOI : 10.1007/978-3-540-28632-5_26

F. Fürbass and J. Wolkerstorfer, ECC Processor with Low Die Size for RFID Applications, 2007 IEEE International Symposium on Circuits and Systems, 2007.
DOI : 10.1109/ISCAS.2007.378271

G. Hachez and J. Quisquater, Montgomery Exponentiation with no Final Subtractions: Improved Results, Cryptographic Hardware and Embedded Systems ? CHES 2000, Second International Workshop, pp.91-100, 1718.
DOI : 10.1007/3-540-44499-8_23

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.3181

P. Hämäläinen, T. Alho, M. Hännikäinen, and T. D. Hämäläinen, Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core, 9th EUROMICRO Conference on Digital System Design (DSD'06), pp.577-583, 2006.
DOI : 10.1109/DSD.2006.40

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, 2004.

D. Hein, J. Wolkerstorfer, and N. Felber, ECC Is Ready for RFID ??? A Proof in Silicon, Selected Areas in Cryptography, 15th International Workshop, 2008.
DOI : 10.1007/978-3-540-28632-5_7

M. Hutter, M. Feldhofer, and T. Plos, An ECDSA Processor for RFID Authentication, Proceedings, Lecture Notes in Computer Science, 2010.
DOI : 10.1007/978-3-642-16822-2_16

T. Izu, B. Möller, and T. Takagi, Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks, Lecture Notes in Computer Science, vol.2551, pp.296-313, 2002.
DOI : 10.1007/3-540-36231-2_24

M. Joye and S. Yen, The Montgomery Powering Ladder, Cryptographic Hardware and Embedded Systems ? CHES 2002, 4th International Workshop, pp.291-302, 2002.
DOI : 10.1007/3-540-36400-5_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.1502

B. Kaliski, The Montgomery inverse and its applications, IEEE Transactions on Computers, vol.44, issue.8, pp.1064-1065, 1995.
DOI : 10.1109/12.403725

J. Kaps, Cryptography for Ultra-Low Power Devices, 2006.

M. Kim, J. Ryou, Y. Choi, and S. Jun, Low Power AES Hardware Architecture for Radio Frequency Identification, First International Workshop on Security Proceedings, volume 4266 of Lecture Notes in Computer Science, pp.353-363, 2006.
DOI : 10.1007/11908739_25

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference Proceedings, volume 1666 of Lecture Notes in Computer Science, pp.388-397, 1999.

S. S. Kumar and C. Paar, Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? In Workshop on RFID Security, 2006.

Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, Elliptic-Curve-Based Security Processor for RFID, IEEE Transactions on Computers, vol.57, issue.11, pp.1514-1527, 2008.
DOI : 10.1109/TC.2008.148

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks ? Revealing the Secrets of Smart Cards, 2007.

N. Meloni, Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains, Cryptology ePrint Archive Report, vol.216, 2006.

A. Satoh and K. Takano, A scalable dual-field elliptic curve cryptographic processor, IEEE Transactions on Computers, vol.52, issue.4, pp.449-460, 2003.
DOI : 10.1109/TC.2003.1190586

J. A. Solinas, Generalized mersenne numbers, 1999.

E. Wenger, M. Feldhofer, and N. Felber, Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices, Information Security Applications, pp.92-106, 2011.
DOI : 10.1007/978-3-642-17955-6_7

J. Wolkerstorfer, Is Elliptic-Curve Cryptography Suitable for Small Devices? In Workshop on RFID and Lightweight Crypto, pp.78-91, 2005.

S. Yen and M. Joye, Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis, IEEE Transactions on Computers, pp.967-970, 2000.