{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T04:31:47Z","timestamp":1776832307569,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540425212","type":"print"},{"value":"9783540447092","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44709-1_31","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T10:04:18Z","timestamp":1186826658000},"page":"377-390","source":"Crossref","is-referenced-by-count":100,"title":["Protections against Differential Analysis for Elliptic Curve Cryptography \u2014 An Algebraic Approach \u2014"],"prefix":"10.1007","author":[{"given":"Marc","family":"Joye","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Tymen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,20]]},"reference":[{"key":"31_CR1","unstructured":"IEEE Std 1363-2000. IEEE Standard Specifications for Public-Key Cryptography. IEEE Computer Society, August 29, 2000."},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/0196-8858(86)90023-0","volume":"7","author":"D.V. Chudnovsky","year":"1986","unstructured":"D.V. Chudnovsky and G.V. Chudnovsky. Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Advances in Applied Math., 7:385\u2013434, 1986\/7.","journal-title":"Advances in Applied Math."},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Henri Cohen. A Course in Computational Algebraic Number Theory. Number 138 in Graduate Texts in Mathematics. Springer-Verlag, 1993.","DOI":"10.1007\/978-3-662-02945-9"},{"key":"31_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 98","author":"H. Cohen","year":"1998","unstructured":"Henri Cohen, Atsuko Miyaji, and Takatoshi Ono. Efficient elliptic curve exponentiation using mixed coordinates. In K. Ohta and D. Pei, editors, Advances in Cryptology-ASIACRYPT\u2019 98, volume 1514 of Lecture Notes in Computer Science, pages 51\u201365. Springer-Verlag, 1998."},{"key":"31_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems (CHES\u2019 99)","author":"J.-S. Coron","year":"1999","unstructured":"Jean-S\u00e9bastien Coron. Resistance against differential power analysis for elliptic curve cryptosystems. In \u00c7.K. Ko\u00e7 and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES\u2019 99), volume 1717 of Lecture Notes in Computer Science, pages 292\u2013302. Springer-Verlag, 1999."},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D. M. Gordon","year":"1998","unstructured":"Daniel M. Gordon. A survey on fast exponentiation methods. Journal of Algorithms, 27:129\u2013146, 1998.","journal-title":"Journal of Algorithms"},{"key":"31_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44499-8_7","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"M. A. Hasan","year":"2000","unstructured":"M. Anwar Hasan. Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems. In \u00c7.K. Ko\u00e7 and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 93\u2013108. Springer-Verlag, 2000."},{"key":"31_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/3-540-46766-1_22","volume-title":"Advances in Cryptology-CRYPTO\u2019 91","author":"N. Koblitz","year":"1992","unstructured":"Neal Koblitz. CM-curves with good cryptographic protocols. In J. Feigenbaum, editor, Advances in Cryptology-CRYPTO\u2019 91, volume 576 of Lecture Notes in Computer Science, pages 279\u2013287. Springer-Verlag, 1992."},{"key":"31_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"P. Kocher","year":"1999","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology-CRYPTO\u2019 99, volume 1666 of Lecture Notes in Computer Science, pages 388\u2013397. Springer-Verlag, 1999."},{"key":"31_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"P. C. Kocher","year":"1996","unstructured":"Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, Advances in Cryptology-CRYPTO\u2019 96, volume 1109 of Lecture Notes in Computer Science, pages 104\u2013113. Springer-Verlag, 1996."},{"key":"31_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/3-540-48071-4_24","volume-title":"Advances in Cryptology-CRYPTO\u2019 92","author":"W. Meier","year":"1993","unstructured":"W. Meier and O. Staffelbach. Efficient multiplication on certain non-supersingular elliptic curves. In E.F. Brickell, editor, Advances in Cryptology-CRYPTO\u2019 92, volume 740 of Lecture Notes in Computer Science, pages 333\u2013344. Springer-Verlag, 1993."},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Alfred J. Menezes. Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"31_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/BFb0028484","volume-title":"Information and Communications Security (ICICS\u2019 97)","author":"A. Miyaji","year":"1997","unstructured":"Atsuko Miyaji, Takatoshi Ono, and Henri Cohen. Efficient elliptic curve exponentiation. In Y. Han, T. Okamoto, and S. Qing, editors, Information and Communications Security (ICICS\u2019 97), volume 1334 of Lecture Notes in Computer Science, pages 282\u2013290. Springer-Verlag, 1997."},{"key":"31_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BFb0052248","volume-title":"Advances in Cryptology-CRYPTO\u2019 97","author":"J. A. Solinas","year":"1997","unstructured":"Jerome A. Solinas. An improved algorithm for arithmetic on a family of elliptic curves. In B. Kaliski, editor, Advances in Cryptology-CRYPTO\u2019 97, volume 1294 of Lecture Notes in Computer Science, pages 357\u2013371. Springer-Verlag, 1997."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2014 CHES 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44709-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T12:42:16Z","timestamp":1550752936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44709-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540425212","9783540447092"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-44709-1_31","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}