{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:42:05Z","timestamp":1761662525550},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_8","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"82-97","source":"Crossref","is-referenced-by-count":19,"title":["Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems"],"prefix":"10.1007","author":[{"given":"Elisabeth","family":"Oswald","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"unstructured":"ANSI. ANSI X9.62 Public Key Cryptography for the Financal Services Industry:The Elliptic Curve Digital Signatur Algorithm (ECDSA), 1999.","key":"8_CR1"},{"key":"8_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-45353-9_19","volume-title":"Progress in Cryptology \u2014 CT-RSA","author":"M. Brown","year":"2001","unstructured":"Michael Brown, Darrel Hankerson, Julio Lopez, and Alfred Menezes. Software Implementation of the NIST Elliptic Curves Over Prime Fields. In Progress in Cryptology \u2014 CT-RSA, volume 2020 of Lecture Notes in Computer Science, pages 250\u2013265. Springer, 2001."},{"key":"8_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Public Key Cryptography","author":"E. Brier","year":"2002","unstructured":"E. Brier and M. Joye. Weierstrass Elliptic Curves and Side-Channel Attacks. In Public Key Cryptography, volume 2274 of Lecture Notes in Computer Science, page 335 ff. Springer, 2002."},{"unstructured":"Certicom Research. Standards For Efficient Cryptography \u2014 SECG 2: Recommended Elliptic Curve Cryptography Domain Parameters. Version 1.0, 2000. Available from http:\/\/www.secg.org\/ .","key":"8_CR4"},{"key":"8_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems","author":"J.-S. Coron","year":"1999","unstructured":"J.-S. Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Workshop on Cryptographic Hardware and Embedded Systems \u2014 CHES 1999, volume 1717 of Lecture Notes in Computer Science, pages 292\u2013302. Springer, 1999."},{"doi-asserted-by":"crossref","unstructured":"D. M. Gordon. A survey of fast exponentiation methods. Journal of Algorithms, (27): pp. 129\u2013146, 1998.","key":"8_CR6","DOI":"10.1006\/jagm.1997.0913"},{"unstructured":"Geoffrey Grimmett and David Stirzaker. Probability and Random Processes. Oxford University Press, 2nd edition, 1992. ISBN: 0198536658.","key":"8_CR7"},{"key":"8_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44499-8_7","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"M. A. Hasan","year":"2000","unstructured":"M. A. Hasan. Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Cryptosystems. In Cryptographic Hardware and Embedded Systems \u2014 CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 93\u2013108. Springer, 2000."},{"doi-asserted-by":"crossref","unstructured":"N. Howgrave-Graham and N. Smart. Lattice attacks on digital signature schemes. Designs, Codes and Cryptography, (23):283\u2013290, August 2001.","key":"8_CR9","DOI":"10.1023\/A:1011214926272"},{"unstructured":"IEEE. Standard Specifications for Public Key Cryptography, Annex A, D13, 1999.","key":"8_CR10"},{"key":"8_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Fast Parallel Elliptic Curve Multiplications Resistant to Side Channel Attacks","author":"T. Izu","year":"2002","unstructured":"T. Izu and T. Takagi. Fast Parallel Elliptic Curve Multiplications Resistant to Side Channel Attacks. In to appear in International Workshop on the Practice and Theory of Public Key Cryptography (PKC2002), Lecture Notes in Computer Science (LNCS). Springer, 2002."},{"key":"8_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-44709-1_33","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"M. Joye","year":"2001","unstructured":"M. Joye and J.-J. Quisquater. Hessian Elliptic Curves and Side-Channel Attacks. In Cryptographic Hardware and Embedded Systems \u2014 CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 402\u2013410, 2001."},{"key":"8_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO 1999","author":"P. C. Kocher","year":"1999","unstructured":"P. C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Advances in Cryptology-CRYPTO 1999, volume 1666 of Lecture Notes in Computer Science, pages 388\u2013397. Springer, 1999."},{"unstructured":"D. E. Knuth. The Art of Computer Programming. Seminumerical Algorithms, volume 2. Addison-Wesley, 3rd edition, 1998.","key":"8_CR14"},{"key":"8_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/3-540-44709-1_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"P.-Y. Liardet","year":"2001","unstructured":"P.-Y. Liardet and N.P. Smart. Preventing SPA\/DPA in ECC Systems Using the Jacobi Form. In Cryptographic Hardware and Embedded Systems \u2014 CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 391\u2013401, 2001."},{"doi-asserted-by":"crossref","unstructured":"F. Morain and J. Olivos. Speeding up the computation on an elliptic curve using addition-subtraction chains. Inform. Theory Appl., (24):531\u2013543, 1990.","key":"8_CR16","DOI":"10.1051\/ita\/1990240605311"},{"key":"8_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/3-540-45439-X_22","volume-title":"Securing Elliptic Curve Point Multiplication against Side-Channel Attacks","author":"B. M\u00f6ller","year":"2001","unstructured":"B. M\u00f6ller. Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. In Information Security \u2014 4th International Conference, ISC 2001, volume 2200 of Lecture Notes in Computer Science (LNCS), page 324 ff. Springer, 2001."},{"unstructured":"NIST. Recommended Elliptic Curves For Federal Government Use, 1999.","key":"8_CR18"},{"key":"8_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44709-1_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"E. Oswald","year":"2001","unstructured":"E. Oswald and M. Aigner. Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. In Cryptographic Hardware and Embedded Systems \u2014 CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 39\u201350. Springer, 2001."},{"key":"8_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44499-8_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"G. Orlando","year":"2000","unstructured":"G. Orlando and Ch. Paar. A high performance reconfigurable elliptic curve processor for gf(2m). In Cryptographic Hardware and Embedded Systems \u2014 CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 41\u201356. Springer, 2000."},{"key":"8_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/3-540-44495-5_16","volume-title":"Progress in Cryptology \u2014 INDOCRYPT 2000","author":"K. Okeya","year":"2000","unstructured":"K. Okeya and K. Sakurai. Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. In Progress in Cryptology \u2014 INDOCRYPT 2000, volume 1977 of Lecture Notes in Computer Science (LNCS), pages 178\u2013190. Springer, 2000."},{"key":"8_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security, E-smart 2001","author":"J.-J. Quisquater","year":"2001","unstructured":"Jean-Jacques Quisquater and David Samyde. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In Smart Card Programming and Security, E-smart 2001, volume 2140 of Lecture Notes in Computer Science, pages 200\u2013210. Springer, 2001."},{"key":"8_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/3-540-45418-7_18","volume-title":"Smart Card Programming and Security (E-Smart 2001)","author":"T. R\u00f6mer","year":"2001","unstructured":"T. R\u00f6mer and J.-P. Seifert. Information leakage attacks against Smart Card implementations of the Elliptic Curve Digital Signature Algorithm. In Smart Card Programming and Security (E-Smart 2001), volume 2104 of Lecture Notes in Computer Science (LNCS), page 211 ff. Springer, 2001."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:40:06Z","timestamp":1556826006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}