1、《On XTR and Side-Channel Analysis 》
9d4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4H3M7X3W2F1k6$3g2J5L8r3W2F1K9#2)9J5k6h3y4G2L8g2)9J5c8X3y4G2L8Y4c8W2L8Y4c8Q4x3V1k6Z5K9s2S2Z5k6K6m8F1y4r3y4T1K9X3u0B7x3i4S2B7i4K6u0r3
2、《Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC》
c6dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4H3M7X3W2F1k6$3g2J5L8r3W2F1K9#2)9J5k6h3y4G2L8g2)9J5c8X3y4G2L8Y4c8W2L8Y4c8Q4x3V1k6U0y4o6b7I4z5o6R3I4y4o6f1K6y4e0f1H3L8o6x3J5i4K6u0r3 3、《Sign Change Fault Attacks on Elliptic Curve Cryptosystems 》
600K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4H3M7X3W2F1k6$3g2J5L8r3W2F1K9#2)9J5k6h3y4G2L8g2)9J5c8X3y4G2L8Y4c8W2L8Y4c8Q4x3V1k6U0y4o6b7J5y4h3H3$3z5e0R3H3y4o6l9^5x3s2p5I4i4K6u0r3 4、《Fault-Tolerant Finite Field Computation in the Public Key Cryptosystems 》
4d6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4H3M7X3W2F1k6$3g2J5L8r3W2F1K9#2)9J5k6h3y4G2L8g2)9J5c8X3y4G2L8Y4c8W2L8Y4c8Q4x3V1j5$3y4U0l9I4x3K6b7J5x3e0f1^5x3e0f1K6y4U0t1I4i4K6u0r3 5、《Improved Zero Value Attack on XTR 》
a06K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4H3M7X3W2F1k6$3g2J5L8r3W2F1K9#2)9J5k6h3y4G2L8g2)9J5c8X3y4G2L8Y4c8W2L8Y4c8Q4x3V1j5K6y4r3y4C8z5s2p5@1N6$3I4^5z5i4g2E0L8h3j5%4i4K6u0r3 6、《Fault Cryptanalysis of ElGamal Signature Scheme 》
b2aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4H3M7X3W2F1k6$3g2J5L8r3W2F1K9#2)9J5k6h3y4G2L8g2)9J5c8X3y4G2L8Y4c8W2L8Y4c8Q4x3V1k6#2x3e0p5I4z5o6M7H3z5o6g2B7P5o6t1J5x3U0p5J5i4K6u0r3 7、《ECC算法的功耗分析研究》
de5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8Q4x3X3g2%4j5h3&6X3j5h3&6Y4k6r3q4@1j5g2)9J5k6h3y4G2L8g2)9J5k6h3y4F1i4K6u0r3f1r3g2J5K9h3!0V1K9h3y4S2L8q4)9#2k6X3A6V1k6$3x3J5x3o6l9%4x3o6R3H3x3o6y4Q4x3X3g2S2M7%4m8^5 8、《椭圆曲线离散对数的攻击现状》
f46K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8Q4x3X3g2%4j5h3&6X3j5h3&6Y4k6r3q4@1j5g2)9J5k6h3y4G2L8g2)9J5k6h3y4F1i4K6u0r3f1r3g2J5K9h3!0V1K9h3y4S2L8q4)9#2k6Y4S2S2k6s2A6C8K9X3c8^5x3U0l9H3x3U0l9K6x3o6t1$3i4K6u0W2j5i4y4H3P5l9`.`. 9、《椭圆曲线加密的时间攻击》
e7fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4U0K9r3!0D9j5i4u0Q4x3X3g2A6L8r3W2T1i4K6u0W2j5$3&6Q4x3V1k6m8i4K6u0V1d9g2y4e0e0W2)9%4c8e0p5H3x3o6S2Q4x3X3b7$3x3e0R3^5i4K6t1^5x3U0l9H3x3#2)9J5z5e0l9K6i4K6u0V1x3o6l9J5y4W2)9J5k6o6l9@1i4K6u0W2K9s2c8E0L8l9`.`. [URL="http://d.wanfangdata.com.cn/Periodical_jsjgc200714044.aspx"]10、《Smartcard上椭圆曲线密码算法的能量攻击和防御》[/URL]