References

[STD]

Standard Curve Database, https://neuromancer.sk/std/

[EFD]

Explicit Formulas Database, https://hyperelliptic.org/EFD/

[GECC]

Guide to Elliptic Curve Cryptography, https://link.springer.com/book/10.1007/b97644

[HEHCC]

Handbook of Elliptic and Hyper-Elliptic Curve Cryptography, https://www.hyperelliptic.org/HEHCC/

[HAC]

Handbook of Applied Cryptography, https://cacr.uwaterloo.ca/hac/

[BBG+17]

Sliding right into disaster: Left-to-right sliding windows leak, https://eprint.iacr.org/2017/627.pdf

[RPA]

A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, http://www.goubin.fr/papers/ecc-dpa.pdf

[ZVP]

Zero-value point attacks on elliptic curve cryptosystem, https://doi.org/10.1007/10958513_17

[EPA]

Exceptional procedure attack on elliptic curve cryptosystems, https://doi.org/10.1007/3-540-36288-6_17

[FFD]

A formula for disaster: a unified approach to elliptic curve special-point-based attacks, https://eprint.iacr.org/2021/1595.pdf

[MT1991]

Mazur, B., & Tate, J. (1991). The p-adic sigma function. Duke Mathematical Journal, 62 (3), 663-688.

[CO2002]

Jean-Sébastien Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, https://link.springer.com/chapter/10.1007/3-540-48059-5_25

[DJB02]

D.J. Bernstein: Pippenger’s Exponentiation Algorithm, https://cr.yp.to/papers/pippenger.pdf

[SG14]

Shay Gueron & Vlad Krasnov. Fast prime field elliptic-curve cryptography with 256-bit primes, https://link.springer.com/article/10.1007/s13389-014-0090-x

[B51]

Andrew D. Booth. A signed binary multiplication technique.

[M61]
    1. Macsorley. High-speed arithmetic in binary computers.