{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:56:17Z","timestamp":1725490577524},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_9","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"98-113","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks"],"prefix":"10.1007","author":[{"given":"Elena","family":"Trichina","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Bellezza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"9_CR1","unstructured":"ANSI X9.62: The elliptic curve digital signature algorithm (ACDSA), draft, July 1997."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"I. Blake, G. Seroussi, N. Smart. Elliptic Curves in Cryptography. Cambridge University Press (1999).","DOI":"10.1017\/CBO9781107360211"},{"key":"9_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Weierstrass elliptic curves and side-channel attacks","author":"E. Brier","year":"2002","unstructured":"Brier, E., Joye,: Weierstrass elliptic curves and side-channel attacks. Proc. Public Key Cryptography (PKC 2002), LNCS 2274 (2002) 335\u2013345"},{"key":"9_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/3-540-45353-9_19","volume-title":"Software implementation of the NIST elliptic curves over prime fields","author":"M. Brown","year":"2001","unstructured":"Brown, M., Hankerson, D., Lopez, J., Menezes, A.: Software implementation of the NIST elliptic curves over prime fields. Proc. CT-RSA 2001, LNCS 2020 (2001) 250\u2013265"},{"key":"9_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/3-540-44709-1_25","volume-title":"Universal exponentiation algorithm: A first step towards provable SPA-resistance","author":"C. Clavier","year":"2001","unstructured":"Clavier, C., Joye, M.: Universal exponentiation algorithm: A first step towards provable SPA-resistance. Proc. Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162 (2001) 300\u2013308"},{"key":"9_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Towards sound approaches to counteract power-analysis attacks","author":"S. Chari","year":"1999","unstructured":"Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. Proc. Advances in Cryptology \u2014 Crypto\u201999, LNCS 1666 (1999) 398\u2013412"},{"key":"9_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Resistance against differential power analysis attacks for elliptic curve cryptosystems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis attacks for elliptic curve cryptosystems. Proc. Cryptographic Hardware and Embedded Systems (CHES\u201999), LNCS 1717 (1999) 292\u2013302"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D. M. Gordon","year":"1998","unstructured":"Gordon, D. M.: A survey of fast exponentiation methods. J. Algorithms\n                  27 (1998) 129\u2013146","journal-title":"J. Algorithms"},{"key":"9_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"DES and differential power analysis","author":"L. Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis. Proc. Cryptographic Hardware and Embedded Systems (CHES\u201999), LNCS 1717 (1999) 158\u2013172"},{"key":"9_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/3-540-44499-8_7","volume-title":"Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems","author":"M. A. Hasan","year":"2000","unstructured":"Hasan, M. A.: Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems. Proc. Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965 (2000) 93\u2013108"},{"key":"9_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Software implementation of elliptic curve cryptography over binary fields","author":"D. Hankerson","year":"2000","unstructured":"Hankerson, D., Hernandez, J. L., Menezes, A.: Software implementation of elliptic curve cryptography over binary fields. Proc. Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965 (2000)"},{"key":"9_CR12","unstructured":"IEEE Std 1363-2000. IEEE Standard Specification for Public-Key Cryptography. IEEE Computer Society, August 29, 2000"},{"key":"9_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/3-540-45664-3_20","volume-title":"A fast parallel elliptic curve multiplication resistant against side channel attacks","author":"T. Izu","year":"2002","unstructured":"Izu, T., Takagi, T.: A fast parallel elliptic curve multiplication resistant against side channel attacks. Proc. Public Key Cryptography (PKC 2002), LNCS 2274 (2002) 280\u2013296"},{"key":"9_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-44709-1_33","volume-title":"Hessian elliptic curves and side-channel attacks","author":"M. Joye","year":"2001","unstructured":"Joye, M., Quisquater, J-J.,: Hessian elliptic curves and side-channel attacks. Proc. Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162 (2001) 402\u2013410"},{"key":"9_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/3-540-44709-1_31","volume-title":"Protection against Differential Power Analysis for elliptic curve cryptography \u2014 An algebraic approach","author":"M. Joye","year":"2001","unstructured":"Joye, M., Tymen, Ch.: Protection against Differential Power Analysis for elliptic curve cryptography \u2014 An algebraic approach. Proc. Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162 (2001) 377\u2013390"},{"key":"9_CR16","unstructured":"Joye, M., Yen, S-M.: The Montgomery powering ladder. In these proceedings."},{"key":"9_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Timing attacks on implementations of Diffie-Hellmann, RSA, DSS, and other systems","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing attacks on implementations of Diffie-Hellmann, RSA, DSS, and other systems. Proc. Advances in Cryptology \u2014 Crypto\u201996, LNCS 1109 (1996) 104\u2013113"},{"key":"9_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Differential power analysis","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. Proc. Advances in Cryptology \u2014 Crypto\u201999, LNCS 1666 (1999) 388\u2013397"},{"key":"9_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","volume-title":"Fast multiplication on elliptic curves over GF(2n) without precomputations","author":"J. Lopez","year":"1999","unstructured":"Lopez, J., Dahab, R.: Fast multiplication on elliptic curves over GF(2n) without precomputations. Proc. Cryptographic Hardware and Embedded Systems (CHES\u201999), LNCS 1717 (1999) 316\u2013327"},{"key":"9_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/3-540-44709-1_32","volume-title":"Preventing SPA\/DPA in ECC systems using the Jacobi form","author":"P.-Y. Liardet","year":"2001","unstructured":"Liardet, P.-Y., Smart, N. P.: Preventing SPA\/DPA in ECC systems using the Jacobi form. Proc. Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162 (2001) 391\u2013401"},{"key":"9_CR21","unstructured":"Menezes, A. J., van Oorschot, P. C., Vanstone, S. A.: Handbook in Applied Cryptography. CRC Press, 1997"},{"key":"9_CR22","series-title":"Lect Notes Comput Sci","volume-title":"Power analysis attacks on modular exponentiation in smartcards","author":"T. S. Messerges","year":"1999","unstructured":"Messerges, T. S., Dabbish, E. A., Sloan, R. H.: Power analysis attacks on modular exponentiation in smartcards. Proc. Cryptographic Hardware and Embedded Systems (CHES\u201999), LNCS 1717 (1999)"},{"issue":"5","key":"9_CR23","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T. S. Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., Sloan, R. H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51 (5) (2002) 541\u2013552","journal-title":"IEEE Transactions on Computers"},{"key":"9_CR24","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2307\/2007888","volume":"48","author":"P. Montgomery","year":"1987","unstructured":"Montgomery, P.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computations, 48 (1987) 243\u2013264","journal-title":"Mathematics of Computations"},{"key":"9_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/3-540-44495-5_16","volume-title":"Power analysis breaks Elliptic Curve cryptosystems even secure against the timing attacks","author":"K. Okeya","year":"2000","unstructured":"Okeya, K., Sakaurai, K.: Power analysis breaks Elliptic Curve cryptosystems even secure against the timing attacks. Proc. INDOCRYPT 2000, LNCS 1977 (2000) 178\u2013190"},{"key":"9_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-44709-1_5","volume-title":"Randomized addition-subtraction chains as a countermeasure against power attacks","author":"E. Oswald","year":"2001","unstructured":"Oswald, E., Aigner, M.: Randomized addition-subtraction chains as a countermeasure against power attacks. Proc. Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162 (2001) 39\u201350"},{"key":"9_CR27","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/3-540-44709-1_4","volume-title":"Non-deterministic processors","author":"D. May","year":"2001","unstructured":"May, D., Muller, H.L., Smart, N.P.: Non-deterministic processors. Proc. Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162 (2001) 28\u201338"},{"key":"9_CR28","series-title":"Lect Notes Comput Sci","first-page":"414","volume-title":"A counter-measure against one physical cryptanalysis may benefit another attack","author":"S.-M. Yen","year":"2002","unstructured":"Yen, S-M., Kim, S-J., Lim, S-G., Moon, S-J: A counter-measure against one physical cryptanalysis may benefit another attack. Proc. Information Security and Cryptology (ICISC 2001), LNCS 2288 (2002) 414\u2013427"},{"key":"9_CR29","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BFb0034836","volume-title":"A fast software implementation for arithmetic operations in GF(2n)","author":"E. Win De","year":"1996","unstructured":"De Win,. E., Bosselaers, A., Vandenberghe, S., De Gersem, P., Vandewalle, J.: A fast software implementation for arithmetic operations in GF(2n). Proc. Asiacrypt\u2019 96, LNCS 1163 (1996) 65\u201376"},{"key":"9_CR30","series-title":"Lect Notes Comput Sci","volume-title":"On the performance of signature schemes based on elliptic curves","author":"E. Win De","year":"1998","unstructured":"De Win,. E., Mister, S., Preneel, B., Wiener M.: On the performance of signature schemes based on elliptic curves. Proc. An Algorithmic Number Theory Symposium, LNCS 1423 (1998)"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Woodbury, A., Bailey, D., Paar, Ch.: Elliptic curve cryptography on smart cards without coprocessors. Proc. The Forth Smart Card Research and Advanced Applications Conf., September 20\u201322, 2000 Bristol, UK","DOI":"10.21236\/ADA385851"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:26:26Z","timestamp":1558473986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}