A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Use of elliptic curves in cryptography Advances in Cryptology-CRYPTO'85, LCNS 218)[483], pp.417-426, 1986. ,
Speeding the Pollard and elliptic curve methods of factorization, Mathematics of Computation, vol.48, issue.177, pp.243-264, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866113-7
Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985. ,
DOI : 10.1090/S0025-5718-1985-0777282-X
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, pp.104-1113, 1996. ,
DOI : 10.1007/3-540-68697-5_9
Differential Power Analysis, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems, CHES'04, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems, CHES'99, pp.292-302, 1999. ,
DOI : 10.1007/3-540-48059-5_25
Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity, IEEE Transactions on Computers, vol.53, issue.6, 2003. ,
DOI : 10.1109/TC.2004.13
The Montgomery Powering Ladder, Cryptographic Hardware and Embedded Systems, CHES'02, pp.291-302, 2002. ,
DOI : 10.1007/3-540-36400-5_22
Leak Resistant Arithmetic, Cryptographic Hardware and Embedded Systems, CHES'04, pp.62-75, 2004. ,
DOI : 10.1007/978-3-540-28632-5_5
URL : https://hal.archives-ouvertes.fr/lirmm-00108863
An RNS Montgomery Modular Multiplication Algorithm, IEEE Trans. Computers, pp.766-776, 1998. ,
a full RNS implementation of RSA, IEEE Transactions on Computers, vol.53, issue.6, pp.769-774, 2004. ,
DOI : 10.1109/TC.2004.2
URL : https://hal.archives-ouvertes.fr/lirmm-00108553
A General Approach for Improving RNS Montgomery Exponentiation Using Pre-processing, 2011 IEEE 20th Symposium on Computer Arithmetic, pp.195-204, 2011. ,
DOI : 10.1109/ARITH.2011.35
URL : https://hal.archives-ouvertes.fr/hal-01098806
Cox-Rower Architecture for Fast Parallel Montgomery Multiplication, Advances in Cryptology, EUROCRYPT'00, pp.523-538, 2000. ,
DOI : 10.1007/3-540-45539-6_37
Modulo reduction in residue number systems, IEEE Transactions on Parallel and Distributed Systems, vol.6, issue.5, pp.449-454, 1995. ,
DOI : 10.1109/71.382314
Hardware Countermeasures against DPA ??? A Statistical Analysis of Their Effectiveness, Proc. CT- RSA, pp.222-235, 2004. ,
DOI : 10.1007/978-3-540-24660-2_18
Template Attacks, Cryptographic Hardware and Embedded Systems, CHES'02, pp.13-28, 2002. ,
DOI : 10.1007/3-540-36400-5_3
Mutual Information Analysis, Cryptographic Hardware and Embedded Systems, CHES'08, pp.426-442, 2008. ,
DOI : 10.1007/978-3-540-85053-3_27
Differential Cluster Analysis, Cryptographic Hardware and Embedded Systems, CHES'09, pp.112-127, 2009. ,
DOI : 10.1007/978-3-642-04138-9_9
Sliding Windows Succumbs to Big Mac Attack, Cryptographic Hardware and Embedded Systems, CHES'01, ser, pp.286-299, 2001. ,
DOI : 10.1007/3-540-44709-1_24
Horizontal Correlation Analysis on Exponentiation, Proc. ICICS, pp.46-61, 2010. ,
DOI : 10.1007/978-3-642-17650-0_5
URL : https://hal.archives-ouvertes.fr/inria-00540384
ROSETTA for Single Trace Analysis, Proc. INDOCRYPT, pp.140-155, 2012. ,
DOI : 10.1007/978-3-642-34931-7_9
URL : https://hal.archives-ouvertes.fr/hal-00776817
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations, Proc. CT-RSA, pp.1-17, 2013. ,
DOI : 10.1007/978-3-642-36095-4_1
Correlation Analysis against Protected SFM Implementations of RSA, Proc. IN- DOCRYPT, pp.98-115, 2013. ,
DOI : 10.1007/978-3-319-03515-4_7
Horizontal Collision Correlation Attack on Elliptic Curves, Reasearch Gate, 2014. ,
Correlation-Enhanced Power Analysis Collision Attack, Cryptographic Hardware and Embedded Systems, CHES'10, ser. LNCS, pp.125-139, 2010. ,
DOI : 10.1007/978-3-642-15031-9_9
Defeating RSA Multiply-Always and Message Blinding Countermeasures, Proc. CT-RSA, ser. LNCS, pp.77-88, 2011. ,
DOI : 10.1017/CBO9780511617041
Electromagnetic Analysis on RSA Algorithm Based on RNS, 2013 Euromicro Conference on Digital System Design, pp.345-352, 2013. ,
DOI : 10.1109/DSD.2013.44
URL : https://hal.archives-ouvertes.fr/lirmm-00861215
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations, IACR Cryptology ePrint Archive, vol.438, 2013. ,
Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA, ETRI Journal, vol.32, issue.1, pp.102-111, 2010. ,
DOI : 10.4218/etrij.10.0109.0249
Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace, Cryptology ePrint Archive, vol.485, 2012. ,
DOI : 10.1007/978-3-319-16715-2_23
Redundant Modular Reduction Algorithms, Proc. CARDIS, pp.102-114, 2011. ,
DOI : 10.1007/978-3-642-27257-8_7