{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:14:34Z","timestamp":1742397274467},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_10","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"114-128","source":"Crossref","is-referenced-by-count":19,"title":["Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor"],"prefix":"10.1007","author":[{"given":"Catherine H.","family":"Gebotys","sequence":"first","affiliation":[]},{"given":"Robert J.","family":"Gebotys","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"10_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"P. Kocher","year":"1996","unstructured":"P. Kocher, \u201cTiming attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems\u201d, LNCS 1109, 1996."},{"key":"10_CR2","series-title":"Lect Notes Comput Sci","first-page":"230","volume-title":"A cryptographic library for the Motorola DSP56000","author":"S. Dusse","year":"1990","unstructured":"S. Dusse, B. Kaliski, \u201cA cryptographic library for the Motorola DSP56000\u201d, vol 473, LNCS, May 1990, pp. 230\u2013244."},{"key":"10_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/3-540-44709-1_32","volume-title":"Preventing SPA\/DPA in ECC systems using the Jacobi Form","author":"P. Liardet","year":"2001","unstructured":"P. Liardet, N. Smart, \u201cPreventing SPA\/DPA in ECC systems using the Jacobi Form\u201d, LNCS 2162, May 2001, pp 391\u2013401."},{"key":"10_CR4","unstructured":"T. Wollinger, M. Wang, J. Guajardo, C. Paar, \u201cHow well areHigh End DSPs Suited for the AES Algorithms?\u201d"},{"key":"10_CR5","unstructured":"IEEE Std 1363-2000, IEEE Standard specifications for public-key cryptography, IEEE computer Soc. 2000."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"D. Hankerson, J. Hernandez, A. Menezes, \u201cSoftware Implementation of NIST Elliptic Curves over Prime Fields\u201d, White Paper, http:\/\/www.certicom.com , 2000","DOI":"10.1007\/3-540-44499-8_1"},{"key":"10_CR7","first-page":"385","volume":"7","author":"D.V. Chudnovsky","year":"1986","unstructured":"Chudnovsky, D.V., G.V. Chudnovsky, \u201cSequences of Numbers generated by addition in formal groups and new primality and factorization tests\u201d, Applied Mathematics, Vol.7, pp 385\u2013434, 1986.","journal-title":"Applied Mathematics"},{"key":"10_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-48059-5_7","volume-title":"CHES\u2019 99","author":"K. Itoh","year":"1999","unstructured":"K. Itoh, M. Takenaka, N. Torii, S. Temma, Y. Kurihara, \u201cFast implementation of publickey cryptography on a DSP TMS320C6201\u201d, CHES\u2019 99, vol 1717, LNCS, 1999, pp. 61\u201372."},{"key":"10_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-44709-1_33","volume-title":"Hessian Elliptic Curves and Side-Channel Attacks","author":"M. Joye","year":"2001","unstructured":"M. Joye, J. Quisquater, \u201cHessian Elliptic Curves and Side-Channel Attacks\u201d LNCS 2162, May 2001, pp 402\u2013410."},{"key":"10_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Crypto\u201999","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe, B. Jun, \u201cDifferential Power Analysis\u201d Crypto\u201999, LNCS 1666, 1999."},{"key":"10_CR11","unstructured":"T. Messerges, E. Dabbish, R. Sloan, \u201cInvestigations of Power analysis attacks on Smartcards\u201d USENIX workshop on Smartcard Technology, 1999."},{"key":"10_CR12","unstructured":"O. Kommerling, M. Kuhn, \u201cDesign principles for Tamper-resistant Smartcard Processors\u201d, USENIX workshop on Smartcard Technology, 1999."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"I. Blake, G. Seroussi, N. Smart, \u201cElliptic Curves in Cryptography\u201d, LMS 265, Cambridge Univ. Press, 2000","DOI":"10.1017\/CBO9781107360211"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"R. Muresan, C. Gebotys, \u201cCurrent consumption dynamics at instruction and program level for a VLIW DSP Processor\u201d, ACM Proc. of ISSS, Oct 2001, pp. 130\u2013135.","DOI":"10.1145\/500001.500032"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T18:14:21Z","timestamp":1629656061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}