..............page:57-64+69
..............page:70-78+87
Chosen message attacks method against ECC implementations
LUO Peng;LI Hui-yun;WANG Kun-peng;WANG Ya-wei;Institute of Software;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Shenzhen Institutes of Advanced Technology;Institute of Information Engineering;Chinese Academy of Sciences;HUADA INFOSEC;
..............page:79-87
..............page:95-100
..............page:101-107
..............page:108-117+123
..............page:118-123
..............page:124-133
..............page:134-140
..............page:141-154
..............page:155-159
..............page:160-166
..............page:167-174
..............page:175-176