1. Cohen H, Miyaji A, Ono T (1998) Efficient elliptic curve exponentiation using mixed coordinates. In: Advances in Cryptology—ASIACRYPT ’98. vol 1514. LNCS, Springer-Verlag, Berlin, pp 51–65
2. Ebeid N, Hasan MA (2003) Analysis of DPA countermeasures based on randomizing the binary algorithm. CACR Technical Reports CORR 2003-14, University of Waterloo
3. Ebeid N, Hasan MA (2003) On randomizing private keys to counteract DPA attacks. In: Selected Areas in Cryptography—SAC ’03. vol 3006. LNCS, Springer-Verlag, Berlin, pp 58–72
4. Fouque PA, Muller F, Poupard G, Valette F (2004) Defeating countermeasures based on randomized BSD representations. In: Cryptographic Hardware and Embedded Systems—CHES ’04. vol 3156 LNCS, Springer-Verlag, Berlin, pp 312–327
5. Ha J, Moon S (2002) Randomized signed-scalar multiplication of ECC to resist power attacks. In: Cryptographic Hardware and Embedded Systems—CHES ’02. vol 2523 LNCS, Springer-Verlag, Berlin, pp 551–563