M. Joye and M. Tunstall, Exponent Recoding and Regular Exponentiation Algorithms, AFRICACRYPT 2009, pp.334-349, 2009.
DOI : 10.1007/11554868_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.477.1245

M. Joye and S. Yen, The Montgomery Powering Ladder, CHES 2002, pp.291-302, 2002.
DOI : 10.1007/3-540-36400-5_22

P. C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO'96, pp.104-113, 1996.
DOI : 10.1007/3-540-68697-5_9

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, CRYPTO'99, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

A. Menezes, P. C. Van-oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

P. Montgomery, Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985.
DOI : 10.1090/S0025-5718-1985-0777282-X

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342