i have much better experience in the networking
Hi friends, some literature review on this topic which I found really helpful
“State of the art of secure ECC implementations:a survey of known side channel attacks and countermeasures” by Junfeng et al
“The Doubling Attack – Why Upwards Is Better than Downwards” by Foque et al
“Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems” by Coron et al
Thanks for sharing those links! I haven’t tried this yet and am interested too, so if you have a go at it let us know. Only so much time in each day