{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:03:17Z","timestamp":1751094197106},"publisher-location":"Boston, MA","reference-count":17,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402081460"},{"type":"electronic","value":"9781402081477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8147-2_8","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T11:57:38Z","timestamp":1140436658000},"page":"115-125","source":"Crossref","is-referenced-by-count":8,"title":["Smart-Card Implementation of Elliptic Curve Cryptography and DPA-Type Attacks"],"prefix":"10.1007","author":[{"given":"Marc","family":"Joye","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"R.M. Avanzi. Countermeasures against differential power analysis for hyperelliptic curve cryptosystems. In C.D. Walter, \u00c7.K. Ko\u00e7 and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 366\u2013381. Springer-Verlag, 2003.","DOI":"10.1007\/978-3-540-45238-6_29"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"S. Chari, C.S. Jutla, J.R. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. In M. Wiener, editor, Advances in Cryptology-CRYPTO\u2019 99, volume 1666 of Lecture Notes in Computer Science, pages 398\u2013412. Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48405-1_26"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"M. Ciet and M. Joye. (Virtually) free randomization techniques for elliptic curve cryptography. In S. Qing, D. Gollmann, and J. Zhou, editors, Information and Communications Security (ICICS 2003), volume 2836 of Lecture Notes in Computer Science, pages 348\u2013359. Springer-Verlag, 2003.","DOI":"10.1007\/978-3-540-39927-8_32"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"C. Clavier and M. Joye. Universal exponentiation algorithm: A first step towards provable SPA-resistance. In \u00c7.K. Ko\u00e7, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 300\u2013308. Springer-Verlag, 2001.","DOI":"10.1007\/3-540-44709-1_25"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"J.-S. Coron. Resistance against differential power analysis for elliptic curve cryptosystems. In \u00c7.K. Ko\u00e7 and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES\u2019 99, volume 1717 of Lecture Notes in Computer Science, pages 292\u2013302. Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48059-5_25"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"E. De Win, S. Mister, B. Preneel, and M. Wiener. On the performance of signature schemes based on elliptic curves. In J.P. Buhler, editor, ANTS-3: Algorithmic Number Theory, volume 1423 of Lecture Notes in Computer Science, pages 252\u2013266. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054867"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"L. Goubin. A refined power analysis attack on elliptic curve cryptosystems. In Y.G. Desmedt, editor, Public Key Cryptography-PKC 2003, volume 2567 of Lecture Notes in Computer Science, pages 199\u2013211. Springer-Verlag, 2003.","DOI":"10.1007\/3-540-36288-6_15"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"D. Hankerson, J. L\u00f3pez Hernandez, and A. Menezes. Software implementation of elliptic curve cryptography over binary fields. In \u00c7.K. Ko\u00e7 and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 1\u201324. Springer-Verlag, 2000.","DOI":"10.1007\/3-540-44499-8_1"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"M.A. Hasan. Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems. In \u00c7.K. Ko\u00e7 and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 93\u2013108. Springer-Verlag, 2000.","DOI":"10.1007\/3-540-44499-8_7"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"M. Joye and C. Tymen. Protections against differential analysis for elliptic curve cryptography: An algebraic approach. In \u00c7.K. Ko\u00e7, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 377\u2013390. Springer-Verlag, 2001.","DOI":"10.1007\/3-540-44709-1_31"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, Advances in Cryptology-CRYPTO\u2019 96, volume 1109 of Lecture Notes in Computer Science, pages 104\u2013113. Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"P.C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology-CRYPTO\u2019 99, volume 1666 of Lecture Notes in Computer Science, pages 388\u2013397. Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"T.S. Messerges. Using second-order power analysis to attack DPA resistant software. In \u00c7.K. Ko\u00e7 and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 238\u2013251. Springer-Verlag, 2000.","DOI":"10.1007\/3-540-44499-8_19"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"R. Schroeppel, H. Orman, S. O\u2019Malley, and O. Spatscheck. Fast key exchange with elliptic curve systems. In D. Coppersmith, editor, Advances in Cryptology-CRYPTO\u2019 95, volume 963 of Lecture Notes in Computer Science, pages 43\u201356. Springer-Verlag, 1995.","DOI":"10.1007\/3-540-44750-4_4"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"J.H. Silverman. The arithmetic of elliptic curves, volume 106 of Graduate Texts in Mathematics. Springer-Verlag, 1986.","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"N.P. Smart. An analysis of Goubin\u2019s refined power analysis attack. In C.D. Walter, \u00c7.K. Ko\u00e7, and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 281\u2013290. Springer-Verlag, 2003.","DOI":"10.1007\/978-3-540-45238-6_23"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"E. Trichina and A. Bellezza. Implementation of elliptic curve cryptography with built-in countermeasures against side channel attacks. In B.S. Kaliski Jr., \u00c7.K. Ko\u00e7, and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2002, volume 2523 of Lecture Notes in Computer Science, pages 98\u2013113. Springer-Verlag, 2003.","DOI":"10.1007\/3-540-36400-5_9"}],"container-title":["IFIP International Federation for Information Processing","Smart Card Research and Advanced Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8147-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T21:04:34Z","timestamp":1555448674000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8147-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402081460","9781402081477"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8147-2_8","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}