Sugawara T, Suzuki D and Saeki M. Two Operands of Multipliers in Side-Channel Attack. Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064. (64-78).
Bauer A and Jaulmes É. Correlation Analysis against Protected SFM Implementations of RSA. Proceedings of the 14th International Conference on Progress in Cryptology — INDOCRYPT 2013 - Volume 8250. (98-115).
Feix B and Venelli A. Defeating with fault injection a combined attack resistant exponentiation. Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design. (32-45).
Abarzúa R and Thériault N. Complete atomic blocks for elliptic curves in jacobian coordinates over prime fields. Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America. (37-55).
Joye M and Tunstall M. Exponent Recoding and Regular Exponentiation Algorithms. Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology. (334-349).