{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:09:40Z","timestamp":1757779780272},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540425212"},{"type":"electronic","value":"9783540447092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44709-1_4","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:04:18Z","timestamp":1186841058000},"page":"28-38","source":"Crossref","is-referenced-by-count":38,"title":["Random Register Renaming to Foil DPA"],"prefix":"10.1007","author":[{"given":"D.","family":"May","sequence":"first","affiliation":[]},{"given":"H. L.","family":"Muller","sequence":"additional","affiliation":[]},{"given":"N. P.","family":"Smart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,20]]},"reference":[{"key":"4_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology, CRYPTO\u2019 99","author":"S. Chari","year":"1999","unstructured":"S. Chari, C.S. Jutla, J.R. Rao and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. Advances in Cryptology, CRYPTO\u2019 99, Springer LNCS 1666, 398\u2013412, 1999."},{"key":"4_CR2","unstructured":"S. Chari, C.S. Jutla, J.R. Rao and P. Rohatgi. A cautionary note regarding evaluation of AES candidates on Smart-Cards. Second Advanced Encryption Standard Candidate Conference, Rome March 1999."},{"key":"4_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"L. Goubin and J. Patarin. DES and differential power analysis. The \u201cduplication method\u201d. Cryptographic Hardware and Embedded Systems, Springer LNCS 1717, 158\u2013172, 1999."},{"key":"4_CR4","volume-title":"Computer architecture: a quantitative approach","author":"J.L. Hennessy","year":"1990","unstructured":"J.L. Hennessy and D.A. Patterson. Computer architecture: a quantitative approach. Morgan Kaufmann Publishers, Palo Alto, California, 1990."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"N. P. Jouppi and D. W. Wall. Available instruction-level parallelism for superscalar and super-pipelined machines. ASPLOS-III, 272\u2013282, 1989.","DOI":"10.1145\/68182.68207"},{"key":"4_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology, CRYPTO\u2019 96","author":"P. Kocher","year":"1996","unstructured":"P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. Advances in Cryptology, CRYPTO\u2019 96, Springer LNCS 1109, 104\u2013113, 1996."},{"key":"4_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology, CRYPTO\u2019 99","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. Advances in Cryptology, CRYPTO\u2019 99, Springer LNCS 1666, 388\u2013397, 1999."},{"key":"4_CR8","unstructured":"O. K\u00f6mmerling and M. Kuhn. Design Principles for Tamper-Resistant Smartcard Processors. USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10-11, 1999."},{"key":"4_CR9","series-title":"Lect Notes Comput Sci","volume-title":"ACISP 2001","author":"D. May","year":"2001","unstructured":"D. May, H. Muller and N.P. Smart Non-Deterministic Processors To appear ACISP 2001, Springer Verlag, LNCS, July 2001."},{"key":"4_CR10","unstructured":"D Sima, T Foutain and P Kacsuk. Advanced Computer Architectures. Addison Wesley, 1997."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2014 CHES 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44709-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T23:24:58Z","timestamp":1556753098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44709-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540425212","9783540447092"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-44709-1_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}