K Okeya, H Kurumatani, K Sakurai - … Workshop on Practice and Theory in …, 2000 - Springer
We show that the elliptic curve cryptosystems based on the Montgomery-form EM: BY 2= X
3+ AX 2+ X are immune to the timing-attacks by using our technique of randomized …