Exponent Recoding and Regular Exponentiation Algorithms, AFRICACRYPT 2009, pp.334-349, 2009. ,
DOI : 10.1007/11554868_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.477.1245
The Montgomery Powering Ladder, CHES 2002, pp.291-302, 2002. ,
DOI : 10.1007/3-540-36400-5_22
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO'96, pp.104-113, 1996. ,
DOI : 10.1007/3-540-68697-5_9
Differential Power Analysis, CRYPTO'99, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916
Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985. ,
DOI : 10.1090/S0025-5718-1985-0777282-X
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342