, Differential addition chains, 2006.
Topics in Computational Number Theory Inspired by Peter L. Montgomery, chap. Montgomery curves and the Montgomery ladder, pp.82-115, 2017. ,
(virtually) free randomization techniques for elliptic curve cryptography. In: Information and Communications Security, 5th International Conference, ICICS, Proceedings. Lecture Notes in Computer Science, vol.2836, pp.348-359, 2003. ,
, On binary signed digit representations of integers. Designs, Codes and Cryptography, vol.42, pp.43-65, 2007.
Defeating countermeasures based on randomized BSD representations, Cryptographic hardware and Embedded Systems, CHES 2004, pp.312-327, 2004.,
URL : https://hal.archives-ouvertes.fr/inria-00563963
Division by invariant integers using multiplication, Proceedings of the ACM SIGPLAN 1994 conference on Programming language design and implementation (PLDI '94), vol.29, pp.61-72, 1994. ,
Randomized mixed-radix scalar multiplication, IEEE Transactions on Computers, vol.67, issue.3, pp.418-431, 2017.,
URL : https://hal.archives-ouvertes.fr/lirmm-01587488
Randomized signed-scalar multiplication of ECC to resist power attacks, Cryptographic Hardware and Embedded Systems, vol.2523, pp.551-563, 2002. ,
Hidden markov model cryptanalysis, Cryptographic Hardware and Embedded Systems, CHES 2003, pp.17-34, 2003. ,
Random digit representation of integers, Proceedings of the 23rd IEEE Symposium on Computer Arithmetic, ARITH23, pp.118-125, 2016. ,
Randomized addition-subtraction chains as a countermeasure against power attacks, Cryprographic Hardware and Embedded Systems, CHES 2001, pp.39-50, 2001. ,
Addition chains of vectors (problem 5125), American Mathematical Monthly, vol.70, pp.806-808, 1964. ,