{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:24:26Z","timestamp":1725459866081},"publisher-location":"Boston, MA","reference-count":33,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402081460"},{"type":"electronic","value":"9781402081477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8147-2_7","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T11:57:38Z","timestamp":1140436658000},"page":"99-113","source":"Crossref","is-referenced-by-count":17,"title":["Efficient Countermeasures Against Power Analysis for Elliptic Curve Cryptosystems"],"prefix":"10.1007","author":[{"given":"Kouichi","family":"Itoh","sequence":"first","affiliation":[]},{"given":"Tetsuya","family":"Izu","sequence":"additional","affiliation":[]},{"given":"Masahiko","family":"Takenaka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","first-page":"366","volume":"2779","author":"R. Avanzi","year":"2003","unstructured":"R. Avanzi, \u201cCountermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems\u201d, CHES 2003, LNCS 2779, pp.366\u2013381, Springer-Verlag, 2003.","journal-title":"LNCS"},{"key":"7_CR2","first-page":"218","volume":"2851","author":"T. Akishita","year":"2003","unstructured":"T. Akishita, and T. Takagi, \u201cZero-value Point Attacks on Elliptic Curve Cryptosystem\u201d, ISC 2003, LNCS 2851, pp.218\u2013233, Springer-Verlag, 2003.","journal-title":"LNCS"},{"key":"7_CR3","first-page":"346","volume":"2947","author":"T. Akishita","year":"2004","unstructured":"T. Akishita, and T. Takagi, \u201cOn the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny\u201d, PKC 2004, LNCS 2947, pp.346\u2013359, Springer-Verlag, 2004.","journal-title":"LNCS"},{"key":"7_CR4","first-page":"335","volume":"2274","author":"E. Brier","year":"2002","unstructured":"E. Brier, and M. Joye, \u201cWeierstra\u00df Elliptic Curves and Side-Channel Attacks\u201d, PKC 2002, LNCS 2274, pp.335\u2013345, Springer-Verlag, 2002.","journal-title":"LNCS"},{"key":"7_CR5","first-page":"292","volume":"1717","author":"J. Coron","year":"1999","unstructured":"J. Coron, \u201cResistance against Differential Power Analysis for Elliptic Curve Cryptosystem\u201d, CHES\u201999, LNCS 1717, pp.292\u2013302, Springer-Verlag, 1999.","journal-title":"LNCS"},{"key":"7_CR6","first-page":"300","volume":"2162","author":"C. Clavier","year":"2001","unstructured":"C. Clavier, and M. Joye, \u201cUniversal exponentiation algorithm-A first step towards provable SPA-resistance\u201d, CHES 2001, LNCS 2162, pp. 300\u2013308, Springer-Verlag, 2001.","journal-title":"LNCS"},{"key":"7_CR7","first-page":"348","volume":"2836","author":"M. Ciet","year":"2003","unstructured":"M. Ciet, and M. Joye, \u201c(Virtually) Free Randomization Technique for Elliptic Curve Cryptography\u201d, ICICS 2003, LNCS 2836, pp. 348\u2013359, Springer-Verlag, 2003.","journal-title":"LNCS"},{"key":"7_CR8","first-page":"51","volume":"1514","author":"H. Cohen","year":"1998","unstructured":"H. Cohen, A. Miyaji, and T. Ono, \u201cEfficient Elliptic Curve Exponentiation Using Mixed Coordinates\u201d, Asiacrypt\u201998, LNCS 1514, pp.51\u201365, Springer-Verlag, 1998.","journal-title":"LNCS"},{"key":"7_CR9","first-page":"199","volume":"2567","author":"L. Goubin","year":"2003","unstructured":"L. Goubin, \u201cA Refined Power-Analysis Attack on Elliptic Curve Cryptosystems\u201d, PKC 2003, LNCS 2567, pp.199\u2013210, Springer-Verlag, 2003.","journal-title":"LNCS"},{"key":"7_CR10","first-page":"129","volume":"2523","author":"K. Itoh","year":"2003","unstructured":"K. Itoh, T. Izu, M. Takenaka, \u201cAddress-bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA\u201d, CHES 2002, LNCS 2523, pp.129\u2013143,2003.","journal-title":"LNCS"},{"key":"7_CR11","first-page":"296","volume":"2551","author":"T. Izu","year":"2002","unstructured":"T. Izu, B. M\u00f6ller, and T. Takagi, \u201cImproved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks\u201d, Indocrypt 2002, LNCS 2551, pp.296\u2013313, Springer-Verlag, 2002.","journal-title":"LNCS"},{"key":"7_CR12","first-page":"280","volume":"2274","author":"T. Izu","year":"2002","unstructured":"T. Izu, and T. Takagi, \u201cA Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks\u201d, PKC 2002, LNCS 2274, pp.280\u2013296, Springer-Verlag, 2002.","journal-title":"LNCS"},{"key":"7_CR13","first-page":"61","volume":"1717","author":"K. Itoh","year":"1999","unstructured":"K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara, \u201cFast Implementation of Public-Key Cryptography on DSP TMS320C6201\u201d, CHES\u201999, LNCS 1717, pp.61\u201372,1999.","journal-title":"LNCS"},{"key":"7_CR14","first-page":"303","volume":"2523","author":"K. Itoh","year":"2003","unstructured":"K. Itoh, J. Yajima, M. Takenaka, and N. Torii, \u201cDPA Countermeasures by Improving the Window Method\u201d, CHES 2002, LNCS 2523, pp.303\u2013317, Springer-Verlag, 2003.","journal-title":"LNCS"},{"key":"7_CR15","first-page":"377","volume":"2162","author":"M. Joye","year":"2001","unstructured":"M. Joye, C. Tymen, \u201cProtections against Differential Analysis for Elliptic Curve Cryptography\u201d, CHES 2001, LNCS 2162, pp.377\u2013390, Springer-Verlag, 2001.","journal-title":"LNCS"},{"key":"7_CR16","first-page":"291","volume":"2523","author":"M. Joye","year":"2003","unstructured":"M. Joye, and S-M. Yen, \u201cThe Montgomery Powering Ladder\u201d, CHES 2002, LNCS 2523, pp.291\u2013302, Springer-Verlag, 2003.","journal-title":"LNCS"},{"key":"7_CR17","first-page":"l04","volume":"1109","author":"C. Kocher","year":"1996","unstructured":"C. Kocher, \u201cTiming Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems\u201d, Crypto\u201996, LNCS 1109,pp.l04\u2013113, Springer-Verlag, 1996.","journal-title":"LNCS"},{"key":"7_CR18","first-page":"388","volume":"1666","author":"C. Kocher","year":"1999","unstructured":"C. Kocher, J. Jaffe, and B. Jun, \u201cDifferential Power Analysis\u201d, Crypto\u201999, LNCS 1666, pp.388\u2013397, Springer-Verlag, 1999.","journal-title":"LNCS"},{"key":"7_CR19","first-page":"324","volume":"2200","author":"B. M\u00f6ller","year":"2001","unstructured":"B. M\u00f6ller, \u201cSecuring Elliptic Curve Point Multiplication against Side-Channel Attacks\u201d, ISC 2001, LNCS 2200, pp.324\u2013334, Springer-Verlag, 2001.","journal-title":"LNCS"},{"key":"7_CR20","first-page":"402","volume":"2433","author":"B. M\u00f6ller","year":"2002","unstructured":"B. M\u00f6ller, \u201cParallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks\u201d, ISC 2002, LNCS 2433, pp.402\u2013413, Springer-Verlag, 2002.","journal-title":"LNCS"},{"key":"7_CR21","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P. Montgomery","year":"1987","unstructured":"P. Montgomery, \u201cSpeeding the Pollard and Elliptic Curve Methods for Factorizations\u201d, Math. of Comp, vol.48, pp.243\u2013264, 1987.","journal-title":"Math. of Comp"},{"key":"7_CR22","first-page":"144","volume":"1717","author":"T. Messerges","year":"1999","unstructured":"T. Messerges, E. Dabbish, and R. Sloan, \u201cPower Analysis Attacks of Modular Exponentiation in Smartcards\u201d, CHES\u201999, LNCS 1717, pp. 144\u2013157, Springer-Verlag, 1999.","journal-title":"LNCS"},{"key":"7_CR23","unstructured":"H. Morimoto, H. Mamiya, and A. Miyaji, \u201cElliptic Curve Cryptosystems Secure against ZPA\u201d(in Japanese), Technical Report of the Institute of Electronicas, Information and Communication Engineers (IEICE), ISEC 2003-103, March, 2004. English version is to appear in the proceedings of CHES 2004."},{"key":"7_CR24","unstructured":"Recommended Elliptic Curves for Federal Government Use, in the appendix of FIPS 186-2, National Institute of Standards and Technology (NIST)."},{"key":"7_CR25","first-page":"39","volume":"2162","author":"E. Oswald","year":"2001","unstructured":"E. Oswald, and M. Aigner, \u201cRandomized Addition-Subtraction Chains as a Countermeasure against Power Attacks\u201d, CHES 2001, LNCS 2162, pp.39\u201350, Springer-Verlag, 2001.","journal-title":"LNCS"},{"key":"7_CR26","first-page":"446","volume":"1751","author":"K. Okeya","year":"2000","unstructured":"K. Okeya, H. Kurumatani, and K. Sakurai, \u201cElliptic curves with the Montgomery form and their cryptographic applications\u201d, PKC 2000, LNCS 1751, pp.446\u2013465, Springer-Verlag, 2000.","journal-title":"LNCS"},{"key":"7_CR27","first-page":"178","volume":"1977","author":"K. Okeya","year":"2000","unstructured":"K. Okeya, and K. Sakurai, \u201cPower analysis breaks elliptic curve cryptosystem even secure against the timing attack\u201d, Indocrypt 2000, LNCS 1977, pp. 178\u2013190, Springer-Verlag, 2000.","journal-title":"LNCS"},{"key":"7_CR28","first-page":"420","volume":"2384","author":"K. Okeya","year":"2002","unstructured":"K. Okeya, and K. Sakurai, \u201cOn Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling\u201d, ACISP 2002, LNCS 2384, pp.420\u2013435, Springer-Verlag, 2002.","journal-title":"LNCS"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"K. Okeya, and K. Sakurai, \u201cA Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks\u201d, to appear in the proceedings of 2003 IEEE Information Theory Workshop.","DOI":"10.1109\/ITW.2003.1216723"},{"key":"7_CR30","first-page":"328","volume":"2612","author":"K. Okeya","year":"2003","unstructured":"K. Okeya, and T. Takagi, \u201cThe Width-w NAF Method Provides Small Memory\u201d, CT-RSA 2003, LNCS 2612, pp.328\u2013342, Springer-Verlag, 2003.","journal-title":"LNCS"},{"key":"7_CR31","first-page":"397","volume":"2779","author":"K. Okeya","year":"2003","unstructured":"K. Okeya, and T. Takagi, \u201cA More Flexible Countermeasure against Side Channel Attacks using Window Method\u201d, CHES 2003, LNCS 2779, pp. 397\u2013410 Springer-Verlag, 2003.","journal-title":"LNCS"},{"key":"7_CR32","first-page":"281","volume":"2779","author":"N. Smart","year":"2003","unstructured":"N. Smart, \u201cAn Analysis of Goubin\u2019s Refined Power Analysis Attack\u201d, CHES 2003, LNCS 2779, pp.281\u2013290, Springer-Verlag, 2003.","journal-title":"LNCS"},{"key":"7_CR33","unstructured":"C. Walter, \u201cSecurity Constraints on the Oswald-Aigner Exponentiation Algorithm\u201d, Cryptology ePrint Archive, Report 2003\/013, 2003."}],"container-title":["IFIP International Federation for Information Processing","Smart Card Research and Advanced Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8147-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,9]],"date-time":"2019-02-09T12:29:54Z","timestamp":1549715394000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8147-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402081460","9781402081477"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8147-2_7","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}