aboutsummaryrefslogtreecommitdiff
path: root/docs/references.rst
blob: d215948c5983f0fdf505c5acb99a939d1fca7a3f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
==========
References
==========

.. [STD] Standard Curve Database, https://neuromancer.sk/std/
.. [EFD] Explicit Formulas Database, https://hyperelliptic.org/EFD/
.. [GECC] Guide to Elliptic Curve Cryptography, https://link.springer.com/book/10.1007/b97644
.. [HEHCC] Handbook of Elliptic and Hyper-Elliptic Curve Cryptography, https://www.hyperelliptic.org/HEHCC/
.. [HAC]  Handbook of Applied Cryptography, https://cacr.uwaterloo.ca/hac/
.. [BBG+17] Sliding right into disaster: Left-to-right sliding windows leak, https://eprint.iacr.org/2017/627.pdf
.. [RPA] A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems, http://www.goubin.fr/papers/ecc-dpa.pdf
.. [ZVP] Zero-value point attacks on elliptic curve cryptosystem, https://doi.org/10.1007/10958513_17
.. [EPA] Exceptional procedure attack on elliptic curve cryptosystems, https://doi.org/10.1007/3-540-36288-6_17
.. [FFD] A formula for disaster: a unified approach to elliptic curve special-point-based attacks, https://eprint.iacr.org/2021/1595.pdf
.. [MT1991] Mazur, B., & Tate, J. (1991). The `p`-adic sigma function. Duke Mathematical Journal, 62 (3), 663-688.