[1]NEAL K.The state of elliptic curve cryptography[J].Designs,Codes and Cryptography,2000(19).173-193.
[2]MILLER V.Use of elliptic curves in cryptography[C].Springer-Verlag,Berlin:Proc.of CRYPTOl985,LNCS 2 1 8,PP.417-426,1986.
[3]ROBERTO A,CHRISTOPHE D,TANJA L.Handbook of elliptic and hyperel-liptic curve crytography[M].USA:Chapman&Hall/CRC,2006.
[4]王育民,刘建伟.通信网的安全-理论与技术[M].西安:西安电子科技大学版社,1999.
[5]石润华,钟诚.一种快速的椭圆曲线标量乘方法[J].计算机工程与应用,2006(2):85-90.
[6]COATES J,GREENBERG R.Arithmetic thery of elliptic curves[C].The 3rd Session of the Centro Intemazionate Matematico Estivo,1997,90:12-19.
[7]OGUZ Y.Scalar multiplication on elliptic curves[D].Orlando:Middle East Technical University,2006.
[8]ANDREAS E.Elliptic curves and their applications to cryptography[M].UK:Kluwer Academic Publishers,1999.
[9]张宁.椭圆曲线上点的标量乘法[D].西安:西安电子科技大学,2005.
[10]CHEVALLIER M B,CIET M,JOYE M.Low-cost solutions for preventing simple side-channel analysis:side-channel atomicity[J].IEEE Trans.Computers,2004,53(6):760-768.
[11]JEAN S C.Resistance against differentinl power analysis for elliptic curve cryptosystems[C].Springer-Verlag:Cryptographic Hardware and Embedded Systems(cHES99),Lecture Notes in Computer Science,1999,1707:292-302.
[12]HENRI C,ATSUKO M,TAKATOSHI O.Efficient elliptic curve exponentiation using mixed coordinates[C].Asia CRYPT98,LNCS 1514,1998:51-65.
[13]刘双根.快速安全的椭圆曲线标量乘算法研究[D].西安:西安电子科技大学,2008.
[14]秦宝东,孔凡玉.基于边带信道原子的安全快速椭圆曲线密码点乘算法[J].计算机应用,2009,29(11):2983-2986.
[15]MARC J,SUNG M Y.The montgomery powering ladder[C].Springer-Varlag:Cryptographic Hardware and Embedded Systems-CHES,Lecture Notes in Computer Science,2003,2523:291-302. |