{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T10:55:48Z","timestamp":1762340148762},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_18","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"214-225","source":"Crossref","is-referenced-by-count":11,"title":["A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis"],"prefix":"10.1007","author":[{"given":"Yvonne","family":"Hitchcock","sequence":"first","affiliation":[]},{"given":"Paul","family":"Montague","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"18_CR1","series-title":"London Mathematical Society Lecture Note Series","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I. Blake","year":"1999","unstructured":"Ian Blake, Gadiel Seroussi, and Nigel Smart. Elliptic Curves in Cryptography, volume 265 of London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge, 1999."},{"key":"18_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology\u2014ASIACRYPT\u2019 98, Proceedings","author":"H. Cohen","year":"1998","unstructured":"Henri Cohen, Atsuko Miyaji, and Takatoshi Ono. Efficient elliptic curve exponentiation using mixed coordinates. In Advances in Cryptology\u2014ASIACRYPT\u2019 98, Proceedings, volume 1514 of Lecture Notes in Computer Science, pages 51\u201365. Springer-Verlag, 1998."},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems\u2014CHES\u2019 99","author":"J. S. Coron","year":"1999","unstructured":"Jean S\u00e9bastien Coron. Resistance against differential power analysis for elliptic curve cryptosystems. In Cryptographic Hardware and Embedded Systems\u2014CHES\u2019 99, volume 1717 of Lecture Notes in Computer Science, pages 292\u2013302. Springer-Verlag, 1999."},{"key":"18_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/BFb0054024","volume-title":"Public Key Cryptography \u2014 PKC\u2019 98, Proceedings","author":"T. Hasegawa","year":"1998","unstructured":"Toshio Hasegawa, Junko Nakajima, and Mitsuru Matsui. A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer. In Public Key Cryptography \u2014 PKC\u2019 98, Proceedings, volume 1431 of Lecture Notes in Computer Science, pages 182\u2013194. Springer-Verlag, 1998."},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Neil Koblitz. Elliptic curve cryptosystems. In Mathematics of Computation, volume 48, pages 203\u2013209, 1987.","journal-title":"Mathematics of Computation"},{"key":"18_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 99","author":"P. Kocher","year":"1999","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In Advances in Cryptology\u2014CRYPTO\u2019 99, volume 1666 of Lecture Notes in Computer Science, pages 388\u2013397. Springer-Verlag, 1999."},{"key":"18_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology\u2014 Proceedings of Crypto 85","author":"V. S. Miller","year":"1986","unstructured":"Victor S. Miller. Use of elliptic curves in cryptography. In Advances in Cryptology\u2014 Proceedings of Crypto 85, volume 218 of Lecture Notes in Computer Science, pages417\u2013426. Springer-Verlag, 1986."},{"key":"18_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/3-540-45439-X_22","volume-title":"Information Security: 4th International Conference, Proceedings\u2014ISC 2001","author":"B. M\u00f6ller","year":"2001","unstructured":"Bodo M\u00f6ller. Securing elliptic curve point multiplication against side-channel attacks. In Information Security: 4th International Conference, Proceedings\u2014ISC 2001, volume 2200 of Lecture Notes in Computer Science, pages 324\u2013334. Springer-Verlag, 2001."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Elisabeth Oswald and Manfred Aigner. Randomized addition-subtraction chains as a countermeasure against power attacks. In Cryptographic Hardware and Embedded Systems\u2014CHES\u2019 01, pages 40\u201352, 2001.","DOI":"10.1007\/3-540-44709-1_5"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T15:28:05Z","timestamp":1550330885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}