{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T04:20:04Z","timestamp":1775794804969,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_15","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"187-197","source":"Crossref","is-referenced-by-count":52,"title":["Simplified Adaptive Multiplicative Masking for AES"],"prefix":"10.1007","author":[{"given":"Elena","family":"Trichina","sequence":"first","affiliation":[]},{"given":"Domenico","family":"De Seta","sequence":"additional","affiliation":[]},{"given":"Lucia","family":"Germani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"15_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","volume-title":"An implementation of DES and AES, secure against some attacks","author":"M. Akkar","year":"2001","unstructured":"Akkar, M., Giraud, C.: An implementation of DES and AES, secure against some attacks. Proc. Cryptographic Hardware and Embedded Systems: CHES 2001, LNCS 2162 (2001) 309\u2013318"},{"key":"15_CR2","unstructured":"Akkar, M., Goubin, L.: A generic protection against high-order differential power analysis. Manuscript"},{"key":"15_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Towards sound approaches to counteract power-analysis attacks","author":"S. Chari","year":"1999","unstructured":"Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. Proc. Advances in Cryptology-Crypto\u201999, LNCS 1666 (1999) 398\u2013412"},{"key":"15_CR4","unstructured":"Courtois, N., Akkar, M.: Time and memory efficiency in protecting against higher order power attacks. Manuscript"},{"key":"15_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES-The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES-The Advanced Encryption Standard. Springer-Verlag Berlin Heidelberg, 2002"},{"key":"15_CR6","series-title":"Lect Notes Comput Sci","first-page":"251","volume-title":"Electromagnetic analysis: concrete results","author":"K. Gandol","year":"2002","unstructured":"Gandol., K., Mourtel, C., Oliver, F.: Electromagnetic analysis: concrete results. Proc. Cryptographic Hardware and Embedded Systems: CHES 2001, LNCS 2162 (2001) 251\u2013261"},{"key":"15_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Multiplicative masking and power analysis of AES","author":"J. Golic","year":"2001","unstructured":"Golic, J., Tymen, Ch.:: Multiplicative masking and power analysis of AES. Proc. Cryptographic Hardware and Embedded Systems: CHES 2002, LNCS 2523 (2002) These proceedings."},{"key":"15_CR8","series-title":"Lect Notes Comput Sci","first-page":"158","volume-title":"DES and differential power analysis","author":"L. Goubin","year":"2002","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis. Proc. Cryptographic Hardware and Embedded Systems: CHES\u201999, LNCS 1717 (1999) 158\u2013172"},{"key":"15_CR9","series-title":"Lect Notes Comput Sci","first-page":"104","volume-title":"Timing attacks on implementations of Diffie-Hellmann, RSA, DSS, and other systems","author":"P. Kocher","year":"1999","unstructured":"Kocher, P.: Timing attacks on implementations of Diffie-Hellmann, RSA, DSS, and other systems. Proc. Advances in Cryptology-Crypto\u201996, LNCS 1109 (1996) 104\u2013113"},{"key":"15_CR10","series-title":"Lect Notes Comput Sci","first-page":"388","volume-title":"Differential power analysis","author":"P. Kocher","year":"1996","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. Proc. Advances in Cryptology-Crypto\u201999, LNCS 1666 (1999) 388\u2013397"},{"key":"15_CR11","unstructured":"Massey, J. L., Lai, X.: Device for the conversion of a digital block and use of same. U.S. Patent # 5,214,703, 25 May 1993"},{"key":"15_CR12","series-title":"Lect Notes Comput Sci","first-page":"150","volume-title":"Securing the AES finalists against power analysis attacks","author":"T. Messerges","year":"1993","unstructured":"Messerges, T.: Securing the AES finalists against power analysis attacks. Proc. Fast Software Encryption Workshop 2000 LNCS 1978 (2000) 150\u2013165"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,12]],"date-time":"2018-10-12T12:09:25Z","timestamp":1539346165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}