1. [1] Y. Baba, A. Miyamoto, N. Homma, and T. Aoki, “Multiple-valued constant-power adder for cryptographic processor,” Proc. 39th IEEE Int. Symp. Multiple-Valued Logic, pp.239-244, May 2009.
2. Differential Power Analysis
3. [3] P. Kocher, R. Lee, G. McGraw, and A. Raghunathan, “Security as a new dimension in embedded system design,” Proc. 41st annual conference on Design automation, pp.753-760, ACM Press, June 2004.
4. [4] S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer-Verlag, 2007.
5. [5] J.S. Coron, “Resistance against differential power analysis for elliptic curve cryptosystems,” CHES 1999, Lecture Notes in Computer Science, vol.1717, pp.192-302, Aug. 1999.