{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:53:03Z","timestamp":1759146783602},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_21","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"276-290","source":"Crossref","is-referenced-by-count":11,"title":["Some Security Aspects of the MIST Randomized Exponentiation Algorithm"],"prefix":"10.1007","author":[{"given":"Colin D.","family":"Walter","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"21_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2001","author":"K. Gandol","year":"2001","unstructured":"K. Gandol., C. Mourtel & F. Olivier, Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems-CHES 2001, \u00c7. Ko\u00e7, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 251\u2013261."},{"key":"21_CR2","first-page":"441","volume":"2","author":"D. E. Knuth","year":"1981","unstructured":"D. E. Knuth, The Art of Computer Programming, vol. 2, \u201cSeminumerical Algorithms\u201d, 2nd Edition, Addison-Wesley, 1981, 441\u2013466.","journal-title":"Seminumerical Algorithms"},{"key":"21_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology-Crypto\u2019 96","author":"P. Kocher","year":"1996","unstructured":"P. Kocher, Timing Attack on Implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology-Crypto\u2019 96, N. Koblitz (editor), Lecture Notes in Computer Science, 1109, Springer-Verlag, 1996, 104\u2013113."},{"key":"21_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-Crypto\u2019 99","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffie & B. Jun, Differential Power Analysis, Advances in Cryptology-Crypto\u2019 99, M. Wiener (editor), Lecture Notes in Computer Science, 1666, Springer-Verlag, 1999, 388\u2013397."},{"key":"21_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44709-1_5","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2001","author":"E. Oswald","year":"2001","unstructured":"E. Oswald & M. Aigner, Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems-CHES 2001, \u00c7. Ko\u00e7, D. Naccache & C. Paar} (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 39\u201350."},{"key":"21_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security (Esmart 2001)","author":"J.-J. Quisquater","year":"2001","unstructured":"J.-J. Quisquater & D. Samyde, ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards, Smart Card Programming and Security (Esmart 2001), Lecture Notes in Computer Science, 2140, Springer-Verlag, 2001, 200\u2013210."},{"key":"21_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Smart Card Programming and Security (E-smart 2002)","author":"J.-J. Quisquater","year":"2002","unstructured":"J.-J. Quisquater & D. Samyde, Eddy current for Magnetic Analysis with Active Sensor, Smart Card Programming and Security (E-smart 2002), Lecture Notes in Computer Science, Springer-Verlag, 2002 to appear."},{"issue":"7","key":"21_CR8","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/12.709375","volume":"47","author":"C. D. Walter","year":"1998","unstructured":"C. D. Walter, Exponentiation using Division Chains, IEEE Transactions on Computers, 47, No. 7, July 1998, 757\u2013765.","journal-title":"IEEE Transactions on Computers"},{"key":"21_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-44709-1_24","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2001","author":"C. D. Walter","year":"2001","unstructured":"C. D. Walter, Sliding Windows succumbs to Big Mac Attack, Cryptographic Hardware and Embedded Systems-CHES 2001, \u00c7. Ko\u00e7, D. Naccache & C. Paar (editors), Lecture Notes in Computer Science, 2162, Springer-Verlag, 2001, 286\u2013299."},{"key":"21_CR10","unstructured":"C. D. Walter, Improvements in, and relating to, Cryptographic Methods and Apparatus, UK Patent Application 0126317.7, Comodo Research Laboratory, 2001."},{"key":"21_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45760-7_5","volume-title":"Topics in Cryptology-CT-RSA 2002","author":"C. D. Walter","year":"2002","unstructured":"C. D. Walter, MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis, Topics in Cryptology-CT-RSA 2002, B. Preneel (editor), Lecture Notes in Computer Science, 2271, Springer-Verlag, 2002, 53\u201366."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T05:10:17Z","timestamp":1550898617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}