{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T04:20:06Z","timestamp":1775794806255,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_16","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"198-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":117,"title":["Multiplicative Masking and Power Analysis of AES"],"prefix":"10.1007","author":[{"given":"Jovan D.","family":"Goli\u0107","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Tymen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"16_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/3-540-44448-3_38","volume-title":"Advances in Cryptology-Asiacrypt 2000","author":"M.-L. Akkar","year":"2000","unstructured":"M.-L. Akkar, R. Bevan, P. Dischamp, and D. Moyart, \u201cPower analysis, what is now possible...,\u201d Advances in Cryptology-Asiacrypt 2000, Lecture Notes in Computer Science, vol. 1976, pp. 489\u2013502, 2000."},{"key":"16_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2001","author":"M.-L. Akkar","year":"2001","unstructured":"M.-L. Akkar and C. Giraud, \u201cAn implementation of DES and AES, secure against some attacks,\u201d Cryptographic Hardware and Embedded Systems-CHES 2001, Lecture Notes in Computer Science, vol. 2162, pp. 309\u2013318, 2001."},{"key":"16_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"S. Chari","year":"1999","unstructured":"S. Chari, C. Jutla, J. Rao, and P. Rohatgi, \u201cTowards sound approaches to counteract power-analysis attacks,\u201d Advances in Cryptology-CRYPTO\u2019 99, Lecture Notes in Computer Science, vol. 1666, pp. 398\u2013412, 1999."},{"key":"16_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45472-1_12","volume-title":"Financial Cryptography-FC 2000","author":"J.-S. Coron","year":"2001","unstructured":"J.-S. Coron, P. Kocher, and D. Naccache, \u201cStatistics and secret leakage,\u201d Financial Cryptography-FC 2000, Lecture Notes in Computer Science, vol. 1962, pp. 157\u2013173, 2001."},{"key":"16_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/3-540-44499-8_18","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"J.-S. Coron","year":"2000","unstructured":"J.-S. Coron and L. Goubin, \u201cOn Boolean and arithmetic masking against differential power analysis,\u201d Cryptographic Hardware and Embedded Systems-CHES 2000, Lecture Notes in Computer Science, vol. 1965, pp. 231\u2013237, 2000."},{"key":"16_CR6","unstructured":"J. Daemen and V. Rijmen, \u201cAES proposal: Rijndael,\u201d 1999, available at \n                    http:\/\/www.nist.gov\/aes\/\n                    \n                  ."},{"key":"16_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems-CHES\u2019 99","author":"L. Goubin","year":"1999","unstructured":"L. Goubin and J. Patarin, \u201cDES and differential power analysis: The duplication method,\u201d Cryptographic Hardware and Embedded Systems-CHES\u2019 99, Lecture Notes in Computer Science, vol. 1717, pp. 158\u2013172, 1999."},{"key":"16_CR8","volume-title":"The Art of Computer Programming","author":"D. E. Knuth","year":"1973","unstructured":"D. E. Knuth, The Art of Computer Programming, Vol. 2, Addison-Wesley, Reading, MA, 1973."},{"key":"16_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe, and B. Jun, \u201cDifferential power analysis,\u201d Advances in Cryptology-CRYPTO\u2019 99, Lecture Notes in Computer Science, vol. 1666, pp. 388\u2013397, 1999."},{"key":"16_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-44706-7_11","volume-title":"Fast Software Encryption-FSE 2000","author":"T. Messerges","year":"2001","unstructured":"T. Messerges, \u201cSecuring the AES finalists against power analysis attacks,\u201d Fast Software Encryption-FSE 2000, Lecture Notes in Computer Science, vol. 1978, pp. 150\u2013164, 2001."},{"key":"16_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"T. Messerges","year":"2000","unstructured":"T. Messerges, \u201cUsing second-order power analysis to attack DPA resistant software,\u201d Cryptographic Hardware and Embedded Systems-CHES 2000, Lecture Notes in Computer Science, vol. 1965, pp. 238\u2013251, 2000."},{"key":"16_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/3-540-44750-4_4","volume-title":"Advances in Cryptology-CRYPTO\u2019 95","author":"R. Schroeppel","year":"1995","unstructured":"R. Schroeppel, H. Orman, S. O'Malley, and O. Spatscheck, \u201cFast key exchange with elliptic curve systems,\u201d Advances in Cryptology-CRYPTO\u2019 95, Lecture Notes in Computer Science, vol. 963, pp. 43\u201356, 1995."},{"key":"16_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/3-540-48059-5_12","volume-title":"Cryptographic Hardware and Embedded Systems-CHES\u2019 99","author":"J. H. Silverman","year":"1999","unstructured":"J. H. Silverman, \u201cFast multiplication in finite fields GF(2N),\u201d Cryptographic Hardware and Embedded Systems-CHES\u2019 99, Lecture Notes in Computer Science, vol. 1717, pp. 122\u2013134, 1999."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:25:05Z","timestamp":1558473905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}