[1]YAO J, ZHANG T. ECC algorithm for preventing side-channel attack[J]. Journal of Computer Applications and Software,2013,30(5):203-205.(姚建波,张涛.抗侧信道攻击的椭圆曲线密码算法[J].计算机应用与软件,2013,30(5):203-205.)
[2]YAO J, ZHANG T. Safe and effective elliptic encryption algorithm resistance against side-channel attack[J]. Journal of Application Research of Computers,2012,29(12):4639-4643.(姚建波,张涛.抗侧信道攻击的安全有效椭圆加密算法[J].计算机应用研究,2012,29(12):4639-4643.)
[3]WANG Z, ZHAO J. Resisting power analysis attack scheme based on signed double-based number system[J]. Journal of Computer Applications,2011,31(11):2973-2975.(王正义,赵俊阁.基于带符号双基数系统的抗功耗攻击方案算法[J].计算机应用,2011,31(11):2973-2975.)
[4]TONG L, LIU N, QIAN J. Improved against power analysis of elliptic curve scalar multiplication algorithm[J].Computer Engineering and Applications,2011,47(33):68-70.(童莲,刘宁,钱江.改进的抗能量分析的椭圆曲线标量乘算法[J].计算机工程与应用,2011,47(33):68-70.)
[5]PUROHIT G N, RAWAT S A, KUMAR M. Elliptic curve point multiplication using MBNR and point halving[J]. International Journal of Advanced Networking and Applications,2012,3(5):1329-1337.
[6]HONG Y, GUI F, DING Y. Extended algorithm for scalar multiplication based on point halving and MBNS[J]. Computer Engineering,2011,37(4):163-165.(洪银芳,桂丰,丁勇.基于半点和多基表示的标量乘法扩展算法[J].计算机工程,2011,37(4):163-165.)
[7]PUROHIT G N, RAWAT A S. Fast scalar multiplication in ECC using the multi base number system[J]. International Journal of Computer Science Issues, 2011,8(1):131-137.
[8]LAI Z, ZHANG Z, TAO D. Algorithm for directly computing 7P elliptic curves and its application[J]. Journal of Computer Applications, 2013,33(7):1870-1874.(赖忠喜,张占军,陶东娅.椭圆曲线中直接计算7P的方法及其应用[J].计算机应用,2013,33(7):1870-1874.)
[9]WANG Y, ZHANG C, ZHANG B. Improved fast algorithm of scalar multiplication for fix base point[J]. Computer Science,2013,40(10):135-138.(王玉玺,张串绒,张柄虹.一种改进的固定基点标量乘快速算法[J].计算机科学,2013,40(10): 135-138.)
[10]YIN X, ZHAO R, HOU H, et al. Fast DBNS scalar multiplication algorithm based on halving operation[J]. Journal of Computer Applications,2009,29(5):1285-1288.(殷新春,赵荣,侯洪详,等.基于折半运算的快速双基数标量乘算法[J].计算机应用,2009,29(5):1285-1288.)
[11]THOMAS C, ARNAUD T. On-the-fly multi-base recoding for ECC scalar multiplication without pre-computations[C]// Proceedings of the 21st IEEE Symposium on Computer Arithmetic. Piscataway: IEEE Press,2013:219-228.
[12]KNUDSEN E W. Elliptic scalar multiplication using point halving[C]// Proceedings of ASIA CRYPT 1999, LNCS 1716. Berlin: Springer-Verlag,1999:135-149.
[13]HANKERSON D, MENEZES A J, VANSTONE S. Guide to elliptic curve cryptography[M]. Berlin: Springer-Verlag,2004.
[14]MISHRA P K, DIMITROV V. Efficient quintuple formulas for elliptic curves and efficient scalar multiplication using multibase number representation[C]// ISC 2007: Proceedings of the 10th International Conference on Information Security, LNCS 4779. Berlin: Springer-verlag,2007:390-406.
[15]DENG W. Research on scalar multiplication of elliptic curve cryptography[D]. Kunming: Kunming University of Science and Technology,2012.(邓维勇.椭圆曲线密码体制中标量乘法研究[D].昆明:昆明理工大学,2012.) |