Hedabou et al., 2005
| Publication | Publication Date | Title |
|---|---|---|
| Ciet et al. | Elliptic curve cryptosystems in the presence of permanent and transient faults | |
| Izu et al. | A fast parallel elliptic curve multiplication resistant against side channel attacks | |
| Itoh et al. | A practical countermeasure against address-bit differential power analysis | |
| Yen et al. | Power analysis by exploiting chosen message and internal collisions–vulnerability of checking mechanism for RSA-decryption | |
| Izu et al. | Improved elliptic curve multiplication methods resistant against side channel attacks | |
| Akishita et al. | Zero-value point attacks on elliptic curve cryptosystem | |
| Hedabou et al. | Countermeasures for preventing comb method against SCA attacks | |
| Abarzúa et al. | Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC | |
| Hedabou et al. | A comb method to render ECC resistant against Side Channel Attacks | |
| Kim et al. | Practical second‐order correlation power analysis on the message blinding method and its novel countermeasure for RSA | |
| KR100772550B1 (en) | Secure Message Blinding Method for Power Analysis Attacks | |
| Kim et al. | An improved and efficient countermeasure against power analysis attacks | |
| Yin et al. | A randomized binary modular exponentiation based RSA algorithm against the comparative power analysis | |
| Smart et al. | Randomised representations | |
| Hedabou et al. | Some ways to secure elliptic curve cryptosystems | |
| Ha et al. | Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm. | |
| Ha et al. | Provably secure countermeasure resistant to several types of power attack for ECC | |
| KR100731575B1 (en) | Encryption method corresponding to power analysis attack | |
| Feng et al. | Efficient comb elliptic curve multiplication methods resistant to power analysis | |
| Tunstall et al. | Coordinate blinding over large prime fields | |
| Joye | Smart-card implementation of elliptic curve cryptography and DPA-type attacks | |
| Hedabou | A frobenius map approach for an efficient and secure multiplication on Koblitz curves | |
| Page et al. | On XTR and side-channel analysis | |
| Bajard et al. | Combining Montgomery ladder for elliptic curves defined over Fp and RNS representation | |
| Nguyen et al. | A combined blinding-shuffling online template attacks countermeasure based on randomized domain Montgomery multiplication |