{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:22:26Z","timestamp":1752672146485},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_23","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"303-317","source":"Crossref","is-referenced-by-count":27,"title":["DPA Countermeasures by Improving the Window Method"],"prefix":"10.1007","author":[{"given":"Kouichi","family":"Itoh","sequence":"first","affiliation":[]},{"given":"Jun","family":"Yajima","sequence":"additional","affiliation":[]},{"given":"Masahiko","family":"Takenaka","sequence":"additional","affiliation":[]},{"given":"Naoya","family":"Torii","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"23_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/3-540-44709-1_25","volume-title":"CHES 2001","author":"C. Clavier","year":"2001","unstructured":"Christophe Clavier and Marc Joye, \u201cUniversal Exponentiation Algorithm-A First Step Towards Provable SPA Resistance\u201d, CHES 2001, LNCS 2162, pp. 300\u2013308, Springer-Verlag, 2001."},{"key":"23_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"CHES\u201999","author":"J.-S. Coron","year":"1999","unstructured":"Jean-S\u00e9bastien Coron, \u201cResistance against Differential Power Analysis for Elliptic Curve Cryptosystems\u201d, CHES\u201999, LNCS 1717, pp. 292\u2013302, Springer-Verlag, 99."},{"key":"23_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/3-540-44709-1_31","volume-title":"CHES 2001","author":"M. Joye","year":"2001","unstructured":"Marc Joye and Christophe Tymen, \u201cProtections against Differential Analysis for Elliptic Curve Cryptography\u201d, CHES 2001, LNCS 2162, pp. 377\u2013390, Springer-Verlag, 2001."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun, \u201cDifferential Power Analysis\u201d, Advances in Cryptography-CRYPTO\u201999, pp. 388\u2013397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"P.-Y. Liardet and N.P. Smart, \u201cPreventing SPA\/DPA in ECC Systems Using the Jacobi Form\u201d, Cryptographic Hardware and Embedded Systems, CHES 2001, pp. 391\u2013401.","DOI":"10.1007\/3-540-44709-1_32"},{"key":"23_CR6","unstructured":"Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan, \u201cInvestigations of Power Analysis Attacks on Smartcards, \u201d, Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151\u2013161."},{"key":"23_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-49019-1","volume-title":"Cryptographic Hardware and Embedded Systems","author":"S. Thomas","year":"1999","unstructured":"Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan, \u201cPower Analysis Attacks of Modular Exponentiation in Smartcards.\u201d, Cryptographic Hardware and Embedded Systems, CHES\u201999, LNCS 1717, pp. 144\u2013157."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Bodo Moller, \u201cSecuring Elliptic Curve Point Multiplication against Side-Channel Attacks\u201d, Information Security-ISC 2001, pp. 324\u2013334.","DOI":"10.1007\/3-540-45439-X_22"},{"key":"23_CR9","series-title":"Lect Notes Comput Sci","first-page":"428","volume-title":"ICISC 2001","author":"K. Okeya","year":"2001","unstructured":"K. Okeya, K. Miyazaki and K. Sakurai, \u201cA fast scalar multiplication method with randomized coordinates on a Montgomery-form elliptic curve secure against side channel attacks\u201d, ICISC 2001, LNCS 2288, pp. 428\u2013439, Springer-Verlag, 2001."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Elisabeth Oswald and Manfred Aigner, \u201cRandomized Addition-Subtraction Chains as a Countermeasure against Power Attacks\u201d, Cryptographic Hardware and Embedded Systems, CHES 2001, pp. 39\u201350.","DOI":"10.1007\/3-540-44709-1_5"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T15:40:03Z","timestamp":1556811603000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}