{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:56:23Z","timestamp":1725490583182},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_39","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"540-550","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication"],"prefix":"10.1007","author":[{"given":"Mathieu","family":"Ciet","sequence":"first","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Sica","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"J-S. Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In RCc. K. Ko\u00e7 and C. Paar, editors, Advances in Cryptology-Proceedings of CHES1999, volume 1717 of Lecture Note in Computer Science, pages 292\u2013302. Springer, 1999.","DOI":"10.1007\/3-540-48059-5_25"},{"key":"39_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms","author":"R. P. Gallant","year":"2001","unstructured":"R. P. Gallant, J. L. Lambert, and S. A. Vanstone. Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. In J. Kilian, editor, Advances in Cryptology-Proceedings of CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 190\u2013200. Springer, 2001."},{"issue":"1","key":"39_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D. M. Gordon","year":"1998","unstructured":"D. M. Gordon. A Survey of Fast Exponentiation Methods. Journal of Algorithms, 27(1):129\u2013146, 1998.","journal-title":"Journal of Algorithms"},{"key":"39_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-44709-1_33","volume-title":"Hessian Elliptic Curves and Side-Channel Attacks","author":"M. Joye","year":"2001","unstructured":"M. Joye and J-J. Quisquater. Hessian Elliptic Curves and Side-Channel Attacks. In \u00c7. K. Ko\u00e7, D. Naccache, and C. Paar, editors, Advances in Cryptology-Proceedings CHES2001, volume 2162 of Lecture Notes in Computer Science, pages 402\u2013410.Springer, 2001."},{"key":"39_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/3-540-44709-1_31","volume-title":"Protections against Differential Analysis for Elliptic Curve Cryptography-An Algebraic Approach","author":"M. Joye","year":"2001","unstructured":"M. Joye and C. Tymen. Protections against Differential Analysis for Elliptic Curve Cryptography-An Algebraic Approach-. In RCc. K. Ko\u00e7, D. Naccache, and C. Paar, editors, Advances in Cryptology-Proceedings CHES2001, volume 2162 of Lecture Notes in Computer Science, pages 377\u2013390. Springer, 2001."},{"key":"39_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","author":"P. C. Kocher","year":"1996","unstructured":"P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In N. Koblitz, editor, Advances in Cryptology-Proceedings of CRYPTO 1996, volume 1109 of Lecture Notes in Computer Science, pages 104\u2013113. Springer, 1996."},{"key":"39_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Differential Power Analysis","author":"P. C. Kocher","year":"1999","unstructured":"P. C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology-Proceedings of CRYPTO 1999, volume 1666 of Lecture Notes in Computer Science, pages 388\u2013397. Springer, 1999."},{"key":"39_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/3-540-44709-1_32","volume-title":"Preventing SPA\/DPA in ECC Systems using the Jacobi Form","author":"P.-Y. Liardet","year":"2001","unstructured":"P.-Y. Liardet and N.P. Smart. Preventing SPA\/DPA in ECC Systems using the Jacobi Form. In RCc. K. Ko\u00e7, D. Naccache, and C. Paar, editors, Advances in Cryptography-Proceedings CHES2001, volume 2162 of Lecture Notes in Computer Science, pages 391\u2013401. Springer, 2001."},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"B. M\u00f6ller. Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. In G.I. Davida and Y. Frankel, editors, Advances in Cryptology-Proceedings of ISC 2001, volume 2200 of Lecture Note in Computer Science, pages 324\u2013334. Springer, 2001.","DOI":"10.1007\/3-540-45439-X_22"},{"key":"39_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/3-540-45664-3_23","volume-title":"An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves","author":"Y.-H. Park","year":"2002","unstructured":"Y-H. Park, S. Jeong, C. Kim, and J. Lim. An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. In D. Naccache and P. Paillier, editors, Advances in Cryptology-Proceedings of PKC 2002, volume 2274 of Lecture Notes in Computer Science, pages 323\u2013334. Springer, 2002."},{"key":"39_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Analysis of the Gallant-Lambert-Vanstone Method based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves","author":"F. Sica","year":"2001","unstructured":"F. Sica, M. Ciet, and J-J. Quisquater. Analysis of the Gallant-Lambert-Vanstone Method based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. In H. Heys and K. Nyberg, editors, Advances in Cryptology-Proceedings of SAC 2002, Lecture Notes in Computer Science. Springer, 2002. To appear."},{"key":"39_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BFb0052248","volume-title":"An Improved Algorithm for Arithmetic on a Family of Elliptic Curves","author":"J. A. Solinas","year":"1997","unstructured":"J. A. Solinas. An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. In Burton S. Kaliski Jr., editor, Advances in Cryptology-Proceedings of CRYPTO 1997, volume 1294 of Lecture Notes in Computer Science, pages 357\u2013371. Springer, 1997."},{"key":"39_CR13","unstructured":"J.A. Solinas. Low-Weight Binary Representations for Pairs of Integers. Technical Report CORR 2001-41, CACR, Available at: \n                    http:\/\/www.cacr.math.uwaterloo.ca\/ techreports\/2001\/corr2001-41.ps\n                    \n                  , 2001."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:25:28Z","timestamp":1558473928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_39","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}