P. Kocher and J. Jaffe, Differential Power Analysis : Leaking Secrets, Advances in Cryptology: Proceedings of CRYPTO'99, pp.388-397, 1999.

, Data Encryption Standard (DES)". Federal Information Processing Standards Publications (FIPS PUBS) Nº 46-3. EUA, 1999.

D. Mesquita and J. Techer, Current Mask Generation: A New Hardware Countermeasure for Masking Signatures of Cryptographic Cores, International Conference on Very Large Scale Integration: proceedings of IFIP VLSI SoC '05, 2005.

J. Coron, Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems, Proceedings of CHES, pp.292-302, 1999.

R. Rivest and A. Shamir, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, ACM Communications, vol.21, pp.120-126, 1978.

D. Chaum, Security without identification: transaction systems to make Big Brother obsolete, Communication of the ACM, vol.8, issue.10, pp.1030-144, 1985.

L. Goubin, A refined power-analysis attack on elliptic curve cryptosystems, Publick Key Cryptography: Proceedings of PKC '03, pp.199-210, 2003.

M. Hideyo and M. Atsuko, Efficient Countermeasures against RPA, DPA, and SPA, Cryptographic Hardware and Embedded Systems, Proceedings of CHES 2004, vol.343, p.356, 2004.

P. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems". 16 th Workshop in Cryptology: Proceedings of Crypto '96, pp.104-113, 1996.

B. Boer, A DPA Attack against the Modular Reduction within a CRT Implementation of RSA, Cryptographic Hardware and Embedded Systems, Proceedings of CHES 2002, pp.228-243, 2002.

H. Garner, The Residue Number System, IRE Transactions in electronic Computers, vol.8, pp.140-147, 1959.

J. Bajard and L. Imbert, Leak Resistant Arithmetic, Cryptographic Hardware and Embedded Systems, Proceedings of CHES 2004, vol.62, p.75, 2004.
URL : https://hal.archives-ouvertes.fr/lirmm-00108863

C. Kim and J. Ha, A CRT-Based RSA Countermeasure against Physical Cryptanalysis, International Conference on High Performance Computing and Communications: Proceedings of HPCC '05, pp.549-554, 2005.

J. Bajard and L. Imbert, A Full RNS Implementation of RSA, IEEE Transactions on Computers, vol.53, issue.6, pp.769-774, 2004.
URL : https://hal.archives-ouvertes.fr/lirmm-00090366

M. Ciet and M. Neve, Parallel FPGA implementation of RSA with residue number systems -can side-channel threats be avoided?, th IEEE International Midwest Symposium on Circuits and Systems: Proceedings of MWSCAS '03, vol.46, 2003.

E. Carvalho and N. Calazans, Reconfiguration Control for Dynamically Reconfigurable Systems, 19 th Conference on Design of Circuits and Integrated Systems: Proceedings of DCIS '04, 2004.