Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 533-537.doi: 10.11896/jsjkx.191200097
• Information Security • Previous Articles Next Articles
GONG Jian-feng
CLC Number:
[1] GUO B,SUN Z T,WANG Y,et al.Resisting power analysis attacks algorithm of scalar multiplication based on factorial expansions form [J].Bulletin of Science and Technology,2016,32(6):149-153. [2] WU K K,LI H Y,YAN L J.Homogeneous mapping model of ECC for preventing differential power analysis[J].Computer Engineering,2017,43(10):115-119. [3] LIANG F,SHEN J N.Resisting power analysis attacks scheme for ellipse curve cryptography based on odd-only Comb method[J].Computer Applications and Software,2016,33(3):288-290. [4] MA B,BAO S G,DAI X Y.Efficiency improvement of ECC resisting power attack scheme in smart card[J].Computer Engineering,2010,36(16):113-115. [5] WANG Z Y,ZHAO J G.Resisting power analysis attack scheme based on signed double-based number system[J].Journal of Computer Applications,2011,31(11):2973-2974. [6] YANG B.Secure and efficient scalar multiplication algorithmwith power analysis attack resistance[J].Control Engineering of China,2017,24(12):2462-2465. [7] LI Y,WANG J L,ZENG X W,et al.A segmented Montgomery scalar multiplication algorithm with resistance to simple power analysis SPA attacks[J].Computer Engineering and Science,2017,30(1):92-101. [8] SHI L,XU M.DWNAF:a dynamic window NAF scalar multiplication with threshold[J].Computer Science,2017,44(10):159-164. [9] PHILLIPS B J,BURGESS N.Implementing 1024-bits RSA exponentiation on a 32-bits processor core[C]//Proceeding of the Application Specific-Systems,Architecture and Processor.2000:127-137. [10] WEI G H,WANG Y,ZHANG H G.ECC point multiplication lightweight improvement for RFID applications over GF(2m)[J].Computer Engineering and Science,2017,39(1):81-85. [11] WANG Y X,ZHANG C R,ZHANG B H,et al.Efficient scalar multiplication of ECC based on composite operations over prime fields[J].Application Research of Computers,2013,30(11):3365-3387. [12] LIU G Z,QI H X.Efficient NAF scalar multiplication algorithm with low storage[J].Science Technology and Engineering,2013,13(19):5683-5686. [13] BARUA R,PANDEY S K,PANKAJ R.Efficient window-based scalar multiplication on elliptic curves using double-base number system [J].Lecture Notes in Computer Science,2007,4859(12):351-360. |
[1] | YOU Wen-zhu, GE Hai-bo. High-performance FPGA Implementation of Elliptic Curve ECC on Binary Domain [J]. Computer Science, 2020, 47(8): 127-131. |
[2] | WU Gui-ming, ZHENG Fang, XIE Xiang-hui, WU Dong and YAN Xin-kai. Hardware Implementation of Scalar Multiplication on Elliptic Curves over GF(2m) [J]. Computer Science, 2015, 42(1): 79-81. |
[3] | LI Zhong. Fast Scalar Multiplication with Resistance Against SPA Attacks [J]. Computer Science, 2014, 41(Z6): 374-376. |
[4] | WANG Yu-xi,ZHANG Chuan-rong and ZHANG Bing-hong. Improved Fast Algorithm of Scalar Multiplication for Fix Base Point [J]. Computer Science, 2013, 40(10): 135-138. |
[5] | . Fast Scalar Multiplication Based on Sliding Window Technology [J]. Computer Science, 2012, 39(Z6): 54-56. |
[6] | . Power Analysis for Executable Program on Single Computer Based on Artificial Neural Network [J]. Computer Science, 2012, 39(5): 282-286. |
[7] | . Correlation Power Analysis on ARIA Block Cipher [J]. Computer Science, 2012, 39(2): 92-94. |
[8] | . Simulation Platform for Differential Power Analysis Attack on DES [J]. Computer Science, 2012, 39(2): 59-60. |
[9] | LIU Hui-ying,WANG Tao,ZHAO Xin-jie,ZHOU Lin. Research on Correlation Power Analysis Attack against PRESENT [J]. Computer Science, 2011, 38(11): 40-42. |
[10] | LI Lang,LI Jing,LI Ren-fa,WU Ke-shou. Research of an Efficient Power Analysis Physical Experiment Platform [J]. Computer Science, 2010, 37(6): 75-77. |
[11] | . [J]. Computer Science, 2009, 36(6): 16-18. |
[12] | . [J]. Computer Science, 2009, 36(5): 96-98. |
[13] | . [J]. Computer Science, 2008, 35(6): 186-189. |
[14] | JIANG Su-Li ,CHEN Yong (The Department of Computer and Science,Chongqing University, Chongqing 400044). [J]. Computer Science, 2006, 33(9): 281-283. |
[15] | HAO Yan-Hua,TAN Shi-Chong,WANG Yu-Min (National Key Laboratory on ISN, Xidian University, Xi'an 710071). [J]. Computer Science, 2006, 33(10): 84-89. |
|