J. Bajard, L. Imbert, P. Liardet, and Y. Teglia, Leak Resistant Arithmetic, CHES, pp.62-75, 2004.
DOI : 10.1007/978-3-540-28632-5_5

URL : https://hal.archives-ouvertes.fr/lirmm-00108863

M. Ciet and M. Joye, (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography, ICICS 2003, pp.348-359, 2003.
DOI : 10.1007/978-3-540-39927-8_32

C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, and V. Verneuil, Horizontal Correlation Analysis on Exponentiation, Proceedings of ICICS 2010, pp.46-61, 2010.
DOI : 10.1007/978-3-642-17650-0_5

URL : https://hal.archives-ouvertes.fr/inria-00540384

J. Coron, Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, CHES, pp.292-302, 1999.
DOI : 10.1007/3-540-48059-5_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695

H. L. Garner, The Residue Number System, IRE Trans. on Elctronic Computers, vol.8, pp.140-147, 1959.

M. Joye and S. Yen, The Montgomery Powering Ladder, CHES 2002, pp.291-302, 2002.
DOI : 10.1007/3-540-36400-5_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.1502

S. Kawamura, M. Koike, F. Sano, and A. Shimbo, Cox-Rower Architecture for Fast Parallel Montgomery Multiplication, Proc. EUROCRYPT, pp.523-538, 2000.
DOI : 10.1007/3-540-45539-6_37

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.344

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Advances in Cryptology, CRYPTO'99, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

P. Montgomery, Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985.
DOI : 10.1090/S0025-5718-1985-0777282-X

G. Perin, L. Imbert, L. Torres, and P. Maurine, Attacking Randomized Exponentiations Using Unsupervised Learning, Proceedings of COSADE 2014, pp.144-160, 2014.
DOI : 10.1007/978-3-319-10175-0_11

URL : https://hal.archives-ouvertes.fr/lirmm-01096039

K. C. Posch and R. Posch, Modulo reduction in residue number systems, IEEE Transactions on Parallel and Distributed Systems, vol.6, issue.5, pp.449-454, 1995.
DOI : 10.1109/71.382314

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

C. D. Walter, Sliding Windows Succumbs to Big Mac Attack, CHES, number Generators in LNCS, pp.286-299, 2001.
DOI : 10.1007/3-540-44709-1_24