參考文獻 |
[1] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystem. Communications of ACM, 21(2):120-126, 1978.
[2] Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Information Theory, 31(4):469-472, July 1985.
[3] Victor S. Miller. Use of elliptic curves in cryptography. In Hugh C. Williams, editor, Advances in Cryptology - CRYPTO '85, volume 218 of Lecture Notes in Computer Science, pages 417-426. Springer, 1986.
[4] Neal Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48(177):203-209, Jan. 1987.
[5] Jurjen Bos and Matthijs Coster. Addition chain heuristics. In Gilles Brassard, editor, Advances in Cryptology - Crypto '89, volume 435 of Lecture Notes in Computer Science, pages 400-407. Springer, 1990.
[6] George W. Reitwiesner. Binary arithmetic. Advances in Computers, 1:231-308, 1960.
[7] Jerome A. Solinas. Efficient arithmetic on Koblitz curves. Design, Codes and Cryptography, 19(2-3):195-249, March 2000.
[8] Hugo Krawczyk and Tal Rabin. Chameleon signatures. In Network and Distributed System Security Symposium, NDSS 2000. The Internet Society, 2000.
[9] E. G. Straus. Addition chains of vectors. The American Mathematical Monthly, 71:806-808, 1964.
[10] Jorge Olivos. On vectorial addition chains. Journal of Algorithms, 2(1):13-21, 1981.
[11] Sung-Ming Yen, Chi-Sung Laih, and Arjen K. Lenstra. Multi-exponentiation. IEE Proceedings: Computers and Digital Techniques, 141(6):325-326, 1994.
[12] Bodo Moller. Algorithms for multi-exponentiation. In Serge Vaudenay and Amr M. Youssef, editors, Selected Areas in Cryptography (SAC 2001), volume 2259 of Lecture Notes in Computer Science, pages 165-180. Springer, 2001.
[13] Jerome A. Solinas. Low-weight binary representations for pairs of integers, 2001. Available at http://www.cacr.math.uwaterloo.ca/techreports/2001/corr2001-41.ps.
[14] John Proos. Joint sparse forms and generating zero columns when combing, 2003. Available at http://www.cacr.math.uwaterloo.ca/techreports/2003/corr2003-23.ps.
[15] Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Neal Koblitz, editor, Advances in Cryptology - CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer, 1996.
[16] Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Introduction to differential power analysis and related attacks, 1998. Available at http://www.cryptography.com/public/pdf/DPATechInfo.pdf.
[17] Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
[18] Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi. The EM side-channel(s). In Burton S. Kaliski Jr., Cetin K. Koc, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 29-45. Springer, 2003.
[19] U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology. Data encryption standard (DES). Federal Information Processing Standards Publication 46-3, Reaffirmed 1999 October 25. Available at http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf.
[20] Elisabeth Oswald. Enhancing simple power-analysis attacks on elliptic curve cryptosystems. In Burton S. Kaliski Jr., Cetin K. Koc, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 82-97. Springer, 2003.
[21] Katsuyuki Okeya and Kouichi Sakurai. On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling. In Lynn Batten and Jennifer Seberry, editors, Information Security and Privacy (ACISP 2002), volume 2384 of Lecture Notes in Computer Science, pages 420-435. Springer, 2002.
[22] Katsuyuki Okeya and Kouichi Sakurai. A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks. In Information Theory Workshop, 2003. Proceedings., pages 175-178. IEEE, 2003.
[23] Katsuyuki Okeya and Dong-Guk Han. Side channel attack on Ha-Moon's countermeasure of randomized signed scalar multiplication. In Thomas Johansson and Subhamoy Maitra, editors, Progress in Cryptology - INDOCRYPT 2003, volume 2904 of Lecture Notes in Computer Science, pages 334-348. Springer, 2003.
[24] Chris Karlof and DavidWagner. Hidden Markov model cryptanalysis. In Colin D. Walter, Cetin K. Koc, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 17-34. Springer, 2003.
[25] Colin D. Walter. Issues of security with the Oswald-Aigner exponentiation algorithm. In Tatsuaki Okamoto, editor, Topics in Cryptology - CT-RSA 2004, volume 2964 of Lecture Notes in Computer Science, pages 208-221. Springer, 2004.
[26] Jean-Sebastien Coron. Resistance against differential power analysis for elliptic curve cryptosystems. In Cetin K. Koc and Christof Paar, editors, Cryptographic Hardware and Embedded Systems (CHES '99), volume 1717 of Lecture Notes in Computer Science, pages 292-302. Springer, 1999.
[27] Marc Joye and Sung-Ming Yen. The Montgomery powering ladder. In Burton S. Kaliski Jr., Cetin K. Koc, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 291-302. Springer, 2003.
[28] Peter L. Montgomery. Speeding the pollard and elliptic curve methods for factorization. Mathematics of Computation, 48(177):243-264, Jan. 1987.
[29] Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and Sangjae Moon. A countermeasure against one physical cryptanalysis may benefit another attack. In Kwangjo Kim, editor, Information Security and Cryptology - ICISC 2001, volume 2288 of Lecture Notes in Computer Science, pages 414-427. Springer, 2002.
[30] Benoit Chevallier-Mames, Mathieu Ciet, and Marc Joye. Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transaction on Computers, 53(6):760-768, 2004. Also available at Cryptology ePrint Archive, Report 2003/237.
[31] Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan. Investigations of power analysis attacks on smartcards. In USENIX Workshop on Smartcard Technology, 1999.
[32] Jean-Sebastien Coron, Paul Kocher, and David Naccache. Statistics and secret leakage. In Yair Frankel, editor, Financial Cryptography (FC 2000), volume 1962 of Lecture Notes in Computer Science, pages 157-173. Springer, 2001.
[33] Christophe Clavier, Jean-Sebastien Coron, and Nora Dabbous. Differential power analysis in the presence of hardware countermeasures. In Cetin K. Koc and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 252-263. Springer, 2000.
[34] Mehdi-Laurent Akkar, Regis Bevan, Paul Dischamp, and Didier Moyart. Power analysis, what is now possible ... . In Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 489-502. Springer, 2000.
[35] Rita Mayer-Sommer. Smartly analyzing the simplicity and the power of simple power analysis on smartcards. In Cetin K. Koc and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 78-92. Springer, 2000.
[36] Eric Brier, Christophe Clavier, and Francis Olivier. Correlation power analysis with a leakage model. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 16-29. Springer, 2004.
[37] Louis Goubin. A refined power-analysis attack on elliptic curve cryptosystems. In Yvo G. Desmedt, editor, Public Key Cryptography - PKC 2003, volume 2567 of Lecture Notes in Computer Science, pages 199-211. Springer, 2003.
[38] Toru Akishita and Tsuyoshi Takagi. Zero-value point attacks on elliptic curve cryptosystem. In Colin Boyd and Wenbo Mao, editors, Information Security (ISC 2003), volume 2851 of Lecture Notes in Computer Science, pages 218-233. Springer, 2003.
[39] Whitfield Diffie and Martin E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644-654, Nov. 1976.
[40] David Chaum. Blind signatures for untraceable payments. In David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Advances in Cryptology: Proceedings of CRYPTO '82, pages 199-203. Plemum, New York, 1983.
[41] Pierre-Alain Fouque and Frederic Valette. The doubling attack - why upwards is better than downwards. In Colin D. Walter, Cetin K. Koc, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 269-280. Springer, 2003.
[42] Elisabeth Oswald and Manfred Aigner. Randomized addition-subtraction chains as a countermeasure against power attacks. In Cetin K. Koc, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 39-50. Springer, 2001.
[43] Francois Morain and Jorge Olivos. Speeding up the computations on an elliptic curve using addition-subtraction chains. Theoretical Informatics and Applications, 24:531-544, 1990.
[44] Jae Cheol Ha and Sang Jae Moon. Randomized signed-scalar multiplication of ECC to resist power attacks. In Burton S. Kaliski Jr., Cetin K. Koc, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 551-563. Springer, 2003.
[45] Sung-Ming Yen, Chien-Ning Chen, SangJae Moon, and JaeCheol Ha. Improvement on Ha-Moon randomized exponentiation algorithm. In Choonsik Park and Seongtaek Chee, editors, Information Security and Cryptology - ICISC 2004, volume 3506 of Lecture Notes in Computer Science, pages 154-167. Springer, 2005.
[46] Pierre-Alain Fouque, Frederic Muller, Guillaume Poupard, and Frederic Valette. Defeating countermeasures based on randomized BSD representations. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 312-327. Springer, 2004.
[47] Sang Gyoo Sim, Dong Jin Park, and Pil Joong Lee. New power analysis on the Ha-Moon algorithm and the MIST algorithm. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security (ICICS 2004), volume 3269 of Lecture Notes in Computer Science, pages 291-304. Springer, 2004.
[48] Jong Hoon Shin, Dong Jin Park, and Pil Joong Lee. Dpa attack on the improved Ha-Moon algorithm. In Jooseok Song, Taekyoung Kwon, and Moti Yung, editors, Information Security Applications (WISA 2005), volume 3786 of Lecture Notes in Computer Science, pages 283-291. Springer, 2006.
[49] Sung-Ming Yen, Wei-Chih Lien, SangJae Moon, and JaeCheol Ha. Power analysis by exploiting chosen message and internal collisions - vulnerability of checking mechanism for RSA-decryption. In Ed Dawson and Serge Vaudenay, editors, Progress in Cryptology - Mycrypt 2005, volume 3715 of Lecture Notes in Computer Science, pages 183-195. Springer, 2005.
[50] Jean-Francois Dhem, Francois Koeune, Philippe-Alexandre Leroux, Patrick Mestre, Jean-Jacques Quisquater, and Jean-Louis Willems. A practical implementation of the timing attack. In Jean-Jacques Quisquater and Bruce Schneier, editors, Smart Card Research and Applications (CARDIS '98), volume 1820 of Lecture Notes in Computer Science, pages 167-182. Springer, 2000.
[51] Peter Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519-521, 1985.
[52] Werner Schindler. A timing attack against RSA with the Chinese remainder theorem. In Cetin K. Koc and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 109-124. Springer, 2000.
[53] David Brumley and Dan Boneh. Remote timing attacks are practical. In 12th USENIX Security Symposium, pages 1-14, 2003.
[54] The OpenSSL Project. OpenSSL: The open source toolkit for SSL/TLS. The official website: http://www.openssl.org/.
[55] Donald E. Knuth. The art of computer programming, volume 2. Addison-Wesley, third edition, 1997.
[56] Richard P. Brent. Analysis of the binary Euclidean algorithm. ACM SIGSAM Bulletin, 10(2):6-7, 1976.
[57] Josef Stein. Computational problems associated with Racah algebra. Journal of Computational Physics, 1:397-405, 1967.
[58] Francois Bergeron, Jean Berstel, Srecko Brlek, and Christine Duboc. Addition chains using continued fractions. Journal of Algorithms, 10:403-412, 1989.
[59] Peter de Rooij. Efficient exponentiation using precomputation and vector addition chains. In Alfredo De Santis, editor, Advances in Cryptology - EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 389-399. Springer, 1995.
[60] Bodo Moller. Improved techniques for fast exponentiation. In Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, volume 2587 of Lecture Notes in Computer Science, pages 298-312. Springer, 2003.
[61] Christophe Clavier and Marc Joye. Universal exponentiation algorithm a first step towards provable SPA-resistance. In Cetin K. Koc, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 300-308. Springer, 2001.
[62] Frederic Muller and Frederic Valette. High-order attacks against the exponent splitting protection. In Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, and Tal Malkin, editors, Public Key Cryptography - PKC 2006, volume 3958 of Lecture Notes in Computer Science, pages 315-329. Springer, 2006.
[63] Mihir Bellare, Juan A. Garay, and Tal Rabin. Fast batch verification of modular exponentiation and digital signatures. In Kaisa Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, volume 1403 of Lecture Notes in Computer Science, pages 236-250. Springer, 1998.
[64] Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Eli Biham, editor, Advances in Cryptology - EUROCRPYT 2003, volume 2656 of Lecture Notes in Computer Science, pages 416-432. Springer, 2003.
[65] Chae Hoon Lim and Pil Joong Lee. More flexible exponentiation with pre-computation. In Yvo G. Desmedt, editor, Advances in Cryptology - CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 95-107. Springer, 1994.
[66] Chae Hoon Lim. Efficient multi-exponentiation and application to batch verification of digital signatures, 2000. Available at http://dasan.sejong.ac.kr/~chlim/pub/multi exp.ps.
[67] Ernest F. Brickell, Daniel M. Gordon, Kevin S. McCurley, and David Bruce Wilson. Fast exponentiation with precomputation. In Rainer A. Rueppel, editor, Advances in Cryptology - EUROCRYPT '92, volume 658 of Lecture Notes in Computer Science, pages 200-207. Springer, 1993.
[68] Marc Joye and Sung-Ming Yen. Optimal left-to-right binary signed-digit recoding. IEEE Trans. on Computers, 49(7):740-748, 2000.
[69] James A. Muir and Douglas R. Stinson. New minimal weight representations for left-to-right window methods. In Alfred Menezes, editor, Topics in Cryptology - CT-RSA 2005, volume 3376 of Lecture Notes in Computer Science, pages 366-383. Springer, 2005.
[70] Dong-Guk Han, , Tetsuya Izu, , and Tsuyoshi Takagi. Some explicit formulae of NAF and its left-to-right analogue. Cryptology ePrint Archive, 2005. Available at http://eprint.iacr.org/2005/384.
[71] Andrew D. Booth. A signed binary multiplication technique. Quarterly Journal of Mechanics and Applied Mathematics, 4(2):236-240, 1951.
|