메뉴 건너뛰기




Volumn 42, Issue 1, 2007, Pages 43-65

On binary signed digit representations of integers

Author keywords

Binary signed digit representation; Non adjacent form; Randomization algorithms

Indexed keywords

ALGORITHMS; DIGITAL SIGNAL PROCESSING; INTEGER PROGRAMMING; PUBLIC KEY CRYPTOGRAPHY;

EID: 33845430064     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-006-9014-9     Document Type: Article
Times cited : (18)

References (12)
  • 1
    • 84947743704 scopus 로고    scopus 로고
    • Efficient elliptic curve exponentiation using mixed coordinates
    • LNCS, Springer-Verlag, Berlin
    • Cohen H, Miyaji A, Ono T (1998) Efficient elliptic curve exponentiation using mixed coordinates. In: Advances in Cryptology-ASIACRYPT '98. vol 1514. LNCS, Springer-Verlag, Berlin, pp 51-65
    • (1998) Advances in Cryptology-ASIACRYPT '98 , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 2
    • 24944539815 scopus 로고    scopus 로고
    • Analysis of DPA countermeasures based on randomizing the binary algorithm
    • University of Waterloo
    • Ebeid N, Hasan MA (2003) Analysis of DPA countermeasures based on randomizing the binary algorithm. CACR Technical Reports CORR 2003-14, University of Waterloo
    • (2003) CACR Technical Reports , vol.CORR 2003-14
    • Ebeid, N.1    Ma, H.2
  • 3
    • 35048836123 scopus 로고    scopus 로고
    • On randomizing private keys to counteract DPA attacks
    • LNCS, Springer-Verlag, Berlin
    • Ebeid N, Hasan MA (2003) On randomizing private keys to counteract DPA attacks. In: Selected Areas in Cryptography-SAC '03. vol 3006. LNCS, Springer-Verlag, Berlin, pp 58-72
    • (2003) Selected Areas in Cryptography-SAC '03 , vol.3006 , pp. 58-72
    • Ebeid, N.1    Ma, H.2
  • 5
    • 35248877672 scopus 로고    scopus 로고
    • Randomized signed-scalar multiplication of ECC to resist power attacks
    • LNCS, Springer-Verlag, Berlin
    • Ha J, Moon S (2002) Randomized signed-scalar multiplication of ECC to resist power attacks. In: Cryptographic Hardware and Embedded Systems-CHES '02. vol 2523 LNCS, Springer-Verlag, Berlin, pp 551-563
    • (2002) Cryptographic Hardware and Embedded Systems-CHES '02 , vol.2523 , pp. 551-563
    • Ha, J.1    Moon, S.2
  • 9
    • 84944889933 scopus 로고    scopus 로고
    • Randomized addition-subtraction chains as a countermeasure against power attacks
    • LNCS, Springer-Verlag, Berlin
    • Oswald E, Aigner M (2001) Randomized addition-subtraction chains as a countermeasure against power attacks. In: Cryptographic Hardware and Embedded Systems-CHES '01. vol 2162 LNCS, Springer-Verlag, Berlin, pp 39-50
    • (2001) Cryptographic Hardware and Embedded Systems-CHES '01 , vol.2162 , pp. 39-50
    • Oswald, E.1    Aigner, M.2
  • 10
    • 77957223221 scopus 로고
    • Binary arithmetic
    • Reitwiesner GW (1960) Binary arithmetic. Adv Comput 1:231-308
    • (1960) Adv Comput , vol.1 , pp. 231-308
    • Reitwiesner, G.W.1
  • 11
    • 33646761064 scopus 로고    scopus 로고
    • New power analysis on the Ha-Moon algorithm and the MIST algorithm
    • LNCS, Springer-Verlag, Berlin
    • Sim SG, Park DJ, Lee PJ (2004) New power analysis on the Ha-Moon algorithm and the MIST algorithm. In: Information and communications security-ICICS '04. vol 3269 LNCS, Springer-Verlag, Berlin, pp 291-304
    • (2004) Information and Communications Security-ICICS '04 , vol.3269 , pp. 291-304
    • Sim, S.G.1    Park, D.J.2    Lee, P.J.3
  • 12
    • 0010029876 scopus 로고    scopus 로고
    • Efficient arithmetic on Koblitz curves
    • Solinas JA (2000) Efficient arithmetic on Koblitz curves. Designs, Codes Cryptogr 19:195-249
    • (2000) Designs, Codes Cryptogr , vol.19 , pp. 195-249
    • Solinas, J.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.