[1]Solinas J A. Efficient arithmetic on Koblitz curves[J]. Designs, Codes and Cryptography, 2000,19(23):195249.
[2]Adachi D,Hirata T.Combination of mixed coordinates strategy and direct computations for efficient scalar multiplications[C]∥Proc of the Communications, Computers and Signal Processing, 2005:117120.
[3]Cohen H, Miyaji A, Ono T. Efficient elliptic curve exponentiation using mixed coordinates[C]∥Proc of the Advances in Cryptology(ASIACRYPT’98), 1998:5165.
[4]Kocher P, Jaffe J,Jun B.Differential power analysis[C]∥Proc of the 19th Annual International Cryptology Conference on Advances in Cryptology, 1999:1.
[5]Zhang Fangguo,Chen Xiaofeng,Wang Yumin.The status of attack on the discrete logarithm of elliptic curves[J]. Journal of Xidian University,2002,29(3):399402.(in Chinese)
[6]Liu Shuanggen, Li Ping, Hu Yupu. Improvement schemes for scalar multiplication algorithm in elliptic curve cryptography[J]. Computer Engineering,2006, 32 (17):2829.(in Chinese)
[7]Zhang Ning.Elliptic curve scalar multiplication secure against power analysis attack[D].Xi’an:Xidian University,2007.(in Chinese)
[8]ChevallierMAMES B, Ciet M, Joye M. Lowcost solutions for preventing simple sidechannel analysis:sidechannel atomicity[J]. IEEE Transactions on Computers, 2006, 53(6):760768.
[9]Tong Lian,Qian Jiang.Scalar multiplication algorithm against SPA and DPA attacks in ECC[J].Computer Engineering and Applications,2010,46(35):7274.(in Chinese)
[10]Mathieu C, Marc J, Kristin L, et al. Trading inversions for multiplications in elliptic curve cryptography [J]. Designs, Codes and Cryptography, 2006, 39(2):189206.
[11]Phillips B J, Burgess N. Implementing 1024bits RSA exponentiation on a 32bits processor core [C]∥Proc of the Application SpecificSystems, Architecture and Processor, 2000:127137.
[12]Ma Bo,Bao Sigang,Dai Xianying. Efficiency improvement of ECC resisting power attack scheme in smart card[J]. Computer Engineering,2010,36(16):113115.(in Chinese)
附中文参考文献:
[5]张方国,陈晓峰,王育民.椭圆曲线离散对数的攻击现状[J].西安电子科技大学学报,2002,29(3):399402.
[6]刘双根,李萍,胡予濮.椭圆曲线密码中标量乘算法的改进方案[J].计算机工程, 2006, 32 (17):2829.
[7]张宁.能量分析攻击下安全的椭圆曲线标量乘法 [D].西安:西安电子科技大学,2007.
[9]童莲,钱江.椭圆曲线中抗SPA和DPA攻击标量乘算法研究[J].计算机工程与应用, 2010, 46 (35):7274.
[12]马博,包斯刚,戴显英.智能卡中ECC抗功耗攻击方案的效率改进[J].计算机工程, 2010, 36 (16):113115. |