{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:07:43Z","timestamp":1737436063177,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_36","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T07:42:01Z","timestamp":1187163721000},"page":"338-347","source":"Crossref","is-referenced-by-count":2,"title":["A Random M-ary Method Based Countermeasure against Side Channel Attacks"],"prefix":"10.1007","author":[{"given":"MahnKi","family":"Ahn","sequence":"first","affiliation":[]},{"given":"JaeCheol","family":"Ha","sequence":"additional","affiliation":[]},{"given":"HoonJae","family":"Lee","sequence":"additional","affiliation":[]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"36_CR1","unstructured":"R. Anderson and M. Kuhn, \u201cTamper resistance-a cautionary note\u201d, In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 1\u201311, 1996."},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"P. Kocher, J. Jaffe, and B. Jun, \u201cDifferential Power Analysis\u201d, In Proceedings of Advances in Cryptology-CRYTO\u201999, pp. 388\u2013397, Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"J.R. Rao and P. Rohatgi., \u201cThe EM Side-Channel(s)\u201d, In Pre-Proceedings of Workshop on Cryptographic hardware and Embedded Systems-CHES\u201902, pp. 29\u201345, Springer-Verlag, 2002.","DOI":"10.1007\/3-540-36400-5_4"},{"key":"36_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"In Advances in Cryptology-CRYPTO\u201985","author":"V. S. Miller","year":"1986","unstructured":"V. S. Miller, \u201cUse of elliptic curve in cryptography\u201d, In Advances in Cryptology-CRYPTO\u201985, LNCS 218, pp. 417\u2013426, Springer-Verlag, 1986."},{"key":"36_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, \u201cElliptic curve cryptosystems\u201d, In Mathematics of Computation, Vol. 48, pp. 203\u2013209, 1987.","journal-title":"In Mathematics of Computation"},{"key":"36_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"In Proceeding of Workshop on Cryptographic hardware and Embedded Systems-CHES\u201999","author":"J. S. Coron","year":"1999","unstructured":"J. S. Coron, \u201cResistance against differential power analysis for elliptic curve cryptosystems\u201d, In Proceeding of Workshop on Cryptographic hardware and Embedded Systems-CHES\u201999, LNCS 1717, pp. 292\u2013302, Springer-Verlag, 1999."},{"key":"36_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/3-540-45450-0_18","volume-title":"In Proceedings of Information Security and Privacy-ACISP\u201902, 7th Australian Conference","author":"Y. Hitchcock","year":"2002","unstructured":"Yvonne Hitchcock and Paul Montague, \u201cA New Elliptic curve scalar multiplication algorithm to resistant simple power analysis\u201d, In Proceedings of Information Security and Privacy-ACISP\u201902, 7th Australian Conference, LNCS 2384, pp. 214\u2013225, Springer-Verlag, 2002."},{"key":"36_CR8","unstructured":"J. C. Ha and S. J. Moon, \u201cRandomized signed-scalar multiplication of ECC to resist Power Attacks\u201d, In Pre-Proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES\u201902, pp. 553\u2013565, Springer-Verlag, 2002."},{"key":"36_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/3-540-45439-X_22","volume-title":"In Proceedings of Information Security Conference-ISC\u201901","author":"B. M\u00f6ller","year":"2001","unstructured":"B. M\u00f6ller, \u201cSecuring elliptic curve point multiplication against side-channel attacks\u201d, In Proceedings of Information Security Conference-ISC\u201901, LNCS 2200, pp. 324\u2013334, Springer-Verlag, 2001."},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"P. Y. Liardet and N. P. Smart, \u201cPreventing SPA\/DPA in ECC systems using the Jacobi form\u201d, In Proceedings of Workshop on Cryptographic hardware and Embedded Systems-CHES\u201901, LNCS 2162, pp. 391\u2013401, Springer-Verlag, 2001.","DOI":"10.1007\/3-540-44709-1_32"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"I. F. Blake, G. Seroussi and N. P. Smart, Elliptic Curves in Cryptography, London Mathematical Society Lecture Note Series. 265, pp. 66\u201372, 1999.","DOI":"10.1017\/CBO9781107360211"},{"key":"36_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-44709-1_5","volume-title":"In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES\u201901","author":"E. Oswald","year":"2001","unstructured":"Oswald E. and Aigner M., \u201cRandomized Addition-Subtraction Chains as a Countermeasure against Power Attacks\u201d, In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES\u201901, LNCS 2162, pp. 39\u201350, Springer-Verlag, 2001."},{"key":"36_CR13","unstructured":"C. D. Walter, \u201cSome Security Aspects of the MIST Randomized Exponentiation Algorithm\u201d, In Pre-Proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES\u201902, pp. 277\u2013291, Springer-Verlag, 2002."},{"key":"36_CR14","unstructured":"K. ITOH, J. YAJIMA, M. TAKENAKA and N. TORII, \u201cDPA Countermeasure by Improving the Window Method\u201d, In Pre-Proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES\u201902, pp. 304\u2013319, Springer-Verlag, 2002."},{"key":"36_CR15","unstructured":"Kris T., Moonmoon A. and Ingrid V., \u201cA Dynamic and Differential CMOS Logic with Signal Independent Power Comsumption to Withstand Differential Power Analysis on Smart Cards\u201d, In 28th European Solid-State Circuits Conference, 2002."},{"key":"36_CR16","series-title":"Lect Notes Comput Sci","first-page":"475","volume-title":"In Proceedings of INDOCRYPT\u201900","author":"K. Okeya","year":"2000","unstructured":"Okeya K. and Sakurai K., \u201cPower analysis breaks elliptic curve cryptosystems even secure against the timing attack\u201d, In Proceedings of INDOCRYPT\u201900, LNCS 1977, pp. 475\u2013486, Springer-Verlag, 2000."},{"key":"36_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/3-540-45811-5_30","volume-title":"In Proceedings of Information Security Conference-ISC\u201902","author":"K. Okeya","year":"2002","unstructured":"Okeya K. and Sakurai K., \u201cA Second-Order DPA Attack Breaks aWindow-method based Countermeasure against Side Channel Attacks\u201d, In Proceedings of Information Security Conference-ISC\u201902, LNCS2433, pp. 389\u2013401, Springer-Verlag, 2002."},{"key":"36_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/3-540-45450-0_32","volume-title":"In Proceedings of Information Security and Privacy-ACISP\u201902, 7th Australian Conference","author":"K. Okeya","year":"2002","unstructured":"Okeya K. and Sakurai K., \u201cOn Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling\u201d, In Proceedings of Information Security and Privacy-ACISP\u201902, 7th Australian Conference, LNCS 2384, pp. 420\u2013435, Springer-Verlag, 2002."},{"key":"36_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/3-540-36231-2_24","volume-title":"In the proceedings of INDOCRYPT\u201902","author":"T. Izu","year":"2002","unstructured":"T. Izu, B. Moller and T. Takagi, \u201cImproved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks\u201d, In the proceedings of INDOCRYPT\u201902, LNCS 2551, pp. 296\u2013313, Springer-Verlag, 2002."},{"key":"36_CR20","unstructured":"C.D Walter, \u201cBreaking the Liardet-Smart Randomized Exponentiation Algorithm\u201d, In the proceedings of Cardis\u201902, USENIX, pp. 59\u201368, 2002."},{"key":"36_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"In Proceeding of Workshop on Cryptographic hardware and Embedded Systems-CHES\u201999","author":"T. S. Messerges","year":"1999","unstructured":"T. S. Messerges, E. A. Dabbish, and R. H. Sloan, \u201cPower Analysis Attacks on Modular Exponentiation in Smartcards\u201d, In Proceeding of Workshop on Cryptographic hardware and Embedded Systems-CHES\u201999, LNCS 1717, pp. 144\u2013157, Springer-Verlag, 1999."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T10:17:55Z","timestamp":1737368275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_36","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}