aboutsummaryrefslogtreecommitdiff
path: root/docs/references.rst
diff options
context:
space:
mode:
authorJ08nY2023-10-04 16:40:31 +0200
committerJ08nY2023-10-04 16:40:31 +0200
commitbff6dc1e9777000d9a1867ce3f0863cbb3900896 (patch)
tree75c3c972853b94ddf3a19536c899e26ca4b63479 /docs/references.rst
parent1c25c3fa1b752c170092d0fff34e1a14f363c602 (diff)
downloadpyecsca-bff6dc1e9777000d9a1867ce3f0863cbb3900896.tar.gz
pyecsca-bff6dc1e9777000d9a1867ce3f0863cbb3900896.tar.zst
pyecsca-bff6dc1e9777000d9a1867ce3f0863cbb3900896.zip
Diffstat (limited to 'docs/references.rst')
-rw-r--r--docs/references.rst1
1 files changed, 1 insertions, 0 deletions
diff --git a/docs/references.rst b/docs/references.rst
index d215948..a805ce8 100644
--- a/docs/references.rst
+++ b/docs/references.rst
@@ -13,3 +13,4 @@ References
.. [EPA] Exceptional procedure attack on elliptic curve cryptosystems, https://doi.org/10.1007/3-540-36288-6_17
.. [FFD] A formula for disaster: a unified approach to elliptic curve special-point-based attacks, https://eprint.iacr.org/2021/1595.pdf
.. [MT1991] Mazur, B., & Tate, J. (1991). The `p`-adic sigma function. Duke Mathematical Journal, 62 (3), 663-688.
+.. [CO2002] Jean-Sébastien Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, https://link.springer.com/chapter/10.1007/3-540-48059-5_25