Differential power analysis, CRYPTO, pp.388-397, 1999. ,
Correlation power analysis with a leakage model, CHES, pp.16-29, 2004. ,
The em sidechannel(s), CHES, pp.29-45, 2002. ,
Enhancing electromagnetic attacks using spectral coherence based cartography, VLSI-SoC, pp.135-155, 2009. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00429342
Electromagnetic analysis: Concrete results, CHES, pp.251-261, 2001. ,
Enhancing correlation electromagnetic attack using planar near-field cartography, DATE, pp.628-633, 2009. ,
Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module, TRETS, vol.2, issue.1, 2009. ,
, New directions in cryptography. Information Theory, IEEE Transactions on, vol.22, pp.644-654, 1976.
A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol.21, pp.120-126, 1978. ,
Montgomery modular multiplication on reconfigurable hardware: Systolic versus multiplexed implementation, In International Journal of Reconfigurable Computing, vol.2011, 2011. ,
Em side-channel attacks on commercial contactless smartcards using low-cost equipment, WISA, pp.79-93, 2009. ,
Enhancement of simple electro-magnetic attacks by precharacterization in frequency domain and demodulation techniques, DATE, pp.1004-1009, 2011. ,
, Modular Multiplication Without Trial Division. Mathematics of Computation, vol.44, pp.519-521, 1985.
The Handbook of Applied Cryptography, 1997. ,
, Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems. CHES, pp.292-302, 1999.
, The Montgomery Powering Ladder. CHES, pp.291-302, 2002.