{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:42:39Z","timestamp":1725486159911},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426103"},{"type":"electronic","value":"9783540454182"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45418-7_18","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T17:08:09Z","timestamp":1180890489000},"page":"211-219","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm"],"prefix":"10.1007","author":[{"given":"Tanja","family":"R\u00f6mer","sequence":"first","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,11]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/BF01445125","volume":"296","author":"W. Banaszcyk","year":"1993","unstructured":"W. Banaszcyk, \u201cNew Bounds in Some Transference Theorems in the Geometry of Numbers\u201d, Mathematische Annalen Vol. 296, pp. 625\u2013635, 1993.","journal-title":"Mathematische Annalen"},{"key":"18_CR2","series-title":"Lect Notes Comput Sci","first-page":"-","volume-title":"Proc. of CRYPTO\u2019 97","author":"M. Bellare","year":"1997","unstructured":"M. Bellare, S. Goldwasser, D. Micciancio, \u201cPseudo-random number generation within cryptogrphic algorithms. The DSS case\u201d, Proc. of CRYPTO\u2019 97, pp.-\u2013-, LNCS Vol. 1294, Springer Verlag, 1997."},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"I. Blake, G. Seroussi, N. Smart, Elliptic Curves in Cryptography, Cambridge University Press, 1999.","DOI":"10.1017\/CBO9781107360211"},{"key":"18_CR4","series-title":"Lect Notes Comput Sci","first-page":"-","volume-title":"Proc. of 27th IC ALP","author":"J. Bl\u00f6mer","year":"2000","unstructured":"J. Bl\u00f6mer, \u201cClosest Vectors, Successive Minima, and Dual HKZ-Bases of Lattices\u201d, Proc. of 27th IC ALP, pp.-\u2013-, LNCS Vol. 1835, Springer Verlag, 2000."},{"key":"18_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1007\/978-3-540-46588-1_19","volume-title":"Proc. of PKC 2000","author":"E. Brickell","year":"2000","unstructured":"E. Brickell, D. Pointcheval, S. Vaudenay, M. Yung, \u201cDesign validations for discrete logarithm based signature schemes\u201d, Proc. of PKC 2000, pp. 276\u2013292, LNCS Vol. 1751, Springer Verlag, 2000."},{"key":"18_CR6","series-title":"Lect Notes Comput Sci","first-page":"-","volume-title":"Proc. of Financial Cryptography 2000","author":"J.-S. Coron","year":"2000","unstructured":"J.-S. Coron, P. Kocher, D. Naccache, \u201cStatistics and secret leakage\u201d, Proc. of Financial Cryptography 2000, Springer LNCS, vol. ?, pp.-\u2013-, 2000."},{"key":"18_CR7","first-page":"262","volume":"17","author":"F.H.K.+._.A. Frieze","year":"1988","unstructured":"FHK+._A. Frieze, J. Hastad, R. Kannan, J. Lagarias, A. Shamir, \u201cReconstructing Truncated Integer Variables Satisfying Linear Congruences\u201d, SI AM J. Vol. 17, pp. 262\u2013280, 1988.","journal-title":"SI AM J."},{"key":"18_CR8","unstructured":"E. Hess, N. Janssen, B. Meyer, T. Sch\u00fctze, \u201cInformation leakage attacks against smart card implementations of cryptographic algorithms and countermeasures\u201d, Proc. of EUROSMART-Security-Conference 2000, pp. 53\u201364, 2000."},{"key":"18_CR9","unstructured":"N. Howgrave-Graham, N. Smart, \u201cLattice attacks on digital signature schemes\u201d, Technical Report HPL-1999-90, HP Labs, 1999."},{"key":"18_CR10","unstructured":"D. Johnson, A. J. Menezes, \u201cThe Elliptic Curve Digital Signature Algorithm (ECDSA)\u201d, Technical Report CORR 99-34, Dept. of C&O, University of Waterloo, 2000."},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1146\/annurev.cs.02.060187.001311","volume":"2","author":"R. Kannan","year":"1987","unstructured":"R. Kannan, \u201cAlgorithmic Geometry of Numbers\u201d, Ann. Rev. Comput. Science Vol. 2, pp. 231\u2013267, 1987.","journal-title":"Ann. Rev. Comput. Science"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"N. Koblitz, A Course in Number Theory and Cryptography, Springer Verlag, 1994.","DOI":"10.1007\/978-1-4419-8592-7"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"N. Koblitz, Algebraic Aspects of Cryptography, Springer Verlag, 1999.","DOI":"10.1007\/978-3-662-03642-6"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"L. Lovasz, An Algorithmic Theory of Graphs, Numbers and Convexity, SIAM, 1986.","DOI":"10.1137\/1.9781611970203"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"A. J. Menezes, Elliptic Curve Public Key Cryptosystemes, Kluwer Academic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"18_CR16","unstructured":"A. J. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1993."},{"key":"18_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"-","DOI":"10.1007\/10722028_4","volume-title":"Proc. 4th Algorithmic Number Theory Symposium","author":"P. Nguyen","year":"2000","unstructured":"P. Nguyen, J. Stern, \u201cLattice Reduction in Cryptology: An update\u201d, Proc. 4th Algorithmic Number Theory Symposium, pp.-\u2013-, LNCS Vol. 1838, Springer Verlag, 2000."},{"key":"18_CR18","volume-title":"Gitterpunkte in mehrdimensionalen Kugeln","author":"A. Walfisz","year":"1957","unstructured":"A. Walfisz, Gitterpunkte in mehrdimensionalen Kugeln, Polish Scientific Publishers, Warsaw, 1957."}],"container-title":["Lecture Notes in Computer Science","Smart Card Programming and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45418-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:39:25Z","timestamp":1558258765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45418-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426103","9783540454182"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45418-7_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"11 September 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}