{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T14:54:36Z","timestamp":1661352876006},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540425212","type":"print"},{"value":"9783540447092","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44709-1_5","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:04:18Z","timestamp":1186841058000},"page":"39-50","source":"Crossref","is-referenced-by-count":62,"title":["Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks"],"prefix":"10.1007","author":[{"given":"Elisabeth","family":"Oswald","sequence":"first","affiliation":[]},{"given":"Manfred","family":"Aigner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,20]]},"reference":[{"key":"5_CR1","unstructured":"E. Biham, A. Shamir, Power Analysis of the Key Scheduling of the AES Candidates Second AES Candidate Conference, Rome, March 1999, pp 115\u2013121."},{"key":"5_CR2","unstructured":"S. Chari, Ch. Jutla, J. Rao, P. Rohatgi.A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards. Second AES Candidate Conference, Rome, March 22\u201323, 1999, pp 133\u2013147."},{"key":"5_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Proceedings of Advances in Cryptology-CRYPTO\u201999","author":"S. Chari","year":"1999","unstructured":"S. Chari, Ch. Jutla, J. Rao, P. Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks, Proceedings of Advances in Cryptology-CRYPTO\u201999, Lecture Notes in Computer Science, vol. 1666, Springer, 1999, pp. 398\u2013412"},{"key":"5_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000)","author":"C. Clavier","year":"2000","unstructured":"C. Clavier, J.-S. Coron, N. Dabbous, Differential Power Analysis in the presence of Hardware Countermeasures, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer, 2000, pp. 252\u2013263"},{"key":"5_CR5","unstructured":"I. Blake, G. Seroussi, N. Smart, Elliptic Curves in Cryptography, London Mathematical Society, Lecture Notes Series 265, Cambridge Universtiy Press"},{"key":"5_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 1999)","author":"J.-S. Coron","year":"1999","unstructured":"J.-S. Coron, Resistance against differential power analysis for elliptic curve cryp-tosystems, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 1999), Lecture Notes in Computer Science, vol. 1717, Springer, 1999, pp. 292\u2013302"},{"key":"5_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/3-540-44499-8_18","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000)","author":"J.-S. Coron","year":"2000","unstructured":"J.-S. Coron, L. Goubin, On Boolean and Arithmetic Masking against Differential Power Analysis, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer, 2000, pp. 231\u2013237"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"J.-S. Coron, P. Kocher, D. Naccache, Statistics and Secret Leackage, to appear in Proceedings of Financial Cryptography, Springer-Verlag, February 2000","DOI":"10.1007\/3-540-45472-1_12"},{"key":"5_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 199)","author":"P. Fahn","year":"1999","unstructured":"P. Fahn, P. Pearson. IPA: A New Class of Power Attacks, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 199), Lecture Notes in Computer Science, vol. 1717, Springer 1999"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D. M. Gordon","year":"1998","unstructured":"D. M. Gordon, A survey of fast exponentiation methods., J. Algorithms, 27, pp. 129\u2013146, 1998","journal-title":"J. Algorithms"},{"key":"5_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 199)","author":"L. Goubin","year":"1999","unstructured":"L. Goubin, J. Patarin. DES and Differential Power Analysis. Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 199), Lecture Notes in Computer Science, vol. 1717, Springer 1999, pp 158\u2013172."},{"key":"5_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/3-540-44499-8_7","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000)","author":"M. A. Hasan","year":"2000","unstructured":"M. A. Hasan, Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Cryptosystems, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer 2000, pp. 93\u2013108"},{"key":"5_CR13","unstructured":"K.F. Ireland, M. Rosen, A Classical Introduction to Modern Number Theory, Graduate Texts in Mathematics, vol. 84, Springer-Verlag, Fifth printing, 1998"},{"key":"5_CR14","unstructured":"D. E. Knuth. Seminumerical algorithms. The Art of Computer Programming. T. II, Addison-Wesley."},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz. Elliptic Curve Cryptosystems, Mathematics of Computation, vol. 48, 1987, pp. 203\u2013209","journal-title":"Mathematics of Computation"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"P. Kocher, J. Jaffe and B. Jun, Differential Power Analysis, Proceedings of Advances in Cryptology-CRYPTO\u201999, Springer 1999, pp. 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"5_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/3-540-44499-8_6","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000)","author":"R. Mayer-Sommer","year":"2000","unstructured":"R. Mayer-Sommer, Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer 2000, pp. 78\u201392"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"A. J. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"5_CR19","unstructured":"T.S. Messerges, E. A. Dabbish and R. H. Sloan, Investigations of Power Analysis Attacks on Smartcards, Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151\u201361."},{"key":"5_CR20","series-title":"Lect Notes Comput Sci","volume-title":"Workshop on Cryptographic Hardware and Embedded Systems","author":"T.S. Messerges","year":"1999","unstructured":"T.S. Messerges, E. A. Dabbish and R. H. Sloan, Power Analysis Attacks of Modular Exponentiation in Smartcards, Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, vol. 1717, Springer 1999."},{"key":"5_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000)","author":"T. S. Messerges","year":"2000","unstructured":"T. S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer 2000, pp. 238\u2013251"},{"key":"5_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-44499-8_5","volume-title":"Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000)","author":"A. Shamir","year":"2000","unstructured":"A. Shamir, Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer 2000, pp. 71\u201377"},{"key":"5_CR23","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"F. Morain, J. Olivos. Speeding up the computation on an elliptic curve using addition-subtraction chains, Inform. Theory Appl. 24 (1990), 531\u2013543.","journal-title":"Inform. Theory Appl."},{"key":"5_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Proceedings of Crypto 85","author":"V. S. Miller","year":"1986","unstructured":"V. S. Miller. Use of Elliptic Curves in Cryptography, Proceedings of Crypto 85, Lecture Notes in Computer Science 218, Springer, 1986, pp. 417\u2013426"},{"key":"5_CR25","unstructured":"N. Weste and K. Eshraghian, Principles of CMOS VLSI Design, Addison-Wesley Publishing Company, 1993."}],"container-title":["Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","Lecture Notes in Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44709-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T23:24:55Z","timestamp":1556753095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44709-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540425212","9783540447092"],"references-count":25,"URL":"http:\/\/dx.doi.org\/10.1007\/3-540-44709-1_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"published":{"date-parts":[[2001]]}}}