{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:32:47Z","timestamp":1775838767017,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540438618","type":"print"},{"value":"9783540454502","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_32","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"420-435","source":"Crossref","is-referenced-by-count":30,"title":["On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling"],"prefix":"10.1007","author":[{"given":"Katsuyuki","family":"Okeya","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"32_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Public Key Cryptography (PKC2002)","author":"Brier","year":"2002","unstructured":"Brier, \u00c9., Joye, M., Weierstrass Elliptic Curves and Side-Channel Attacks, Public Key Cryptography (PKC2002), LNCS2274, (2002), 335\u2013345."},{"key":"32_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 98","author":"H. Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T., Efficient Elliptic Curve Exponentiation Using Mixed Coordinates, Advances in Cryptology-ASIACRYPT\u2019 98, LNCS1514, (1998), 51\u201365."},{"key":"32_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems (CHES\u201999)","author":"J.S. Coron","year":"1999","unstructured":"Coron, J.S., Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (CHES\u201999), LNCS1717, (1999), 292\u2013302."},{"key":"32_CR4","unstructured":"Fischer, W., Giraud, C., Knudsen, E.W., Seifert, J.P., Parallel scalar multiplication on general elliptic curves over Fp\n                           hedged against Non-Differential Side-Channel Attacks, International Association for Cryptologic Research (IACR), Cryptology ePrint Archive 2002\/007, (2002). Available at \n                    http:\/\/eprint.iacr.org\/"},{"key":"32_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/3-540-44499-8_7","volume-title":"Cryptographic Hardware and Embedded Systems (CHES2000)","author":"M.A. Hasan","year":"2000","unstructured":"Hasan, M.A., Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (CHES2000), LNCS1965, (2000), 93\u2013108."},{"key":"32_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/3-540-45664-3_20","volume-title":"Public Key Cryptography (PKC2002)","author":"T. Izu","year":"2002","unstructured":"Izu, T., Takagi, T., A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks, Public Key Cryptography (PKC2002), LNCS2274, (2002), 280\u2013296."},{"key":"32_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-44709-1_33","volume-title":"Cryptographic Hardware and Embedded Systems (CHES\u201901)","author":"M. Joye","year":"2001","unstructured":"Joye, M., Quisquater, J.J., Hessian elliptic curves and side-channel attacks, Cryptographic Hardware and Embedded Systems (CHES\u201901), LNCS2162, (2001), 402\u2013410."},{"key":"32_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/3-540-44709-1_31","volume-title":"Cryptographic Hardware and Embedded Systems (CHES\u201901)","author":"M. Joye","year":"2001","unstructured":"Joye, M., Tymen, C., Protections against Differential Analysis for Elliptic Curve Cryptography-An Algebraic Approach-, Cryptographic Hardware and Embedded Systems (CHES\u201901), LNCS2162, (2001), 377\u2013390."},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N., Elliptic curve cryptosystems, Math. Comp. 48, (1987), 203\u2013209.","journal-title":"Math. Comp."},{"key":"32_CR10","unstructured":"Kocher, C., Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks. Available at \n                    http:\/\/www.cryptography.com\/"},{"key":"32_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"C. Kocher","year":"1996","unstructured":"Kocher, C., Timing Attacks on Implementations of Diffie-Hellman, RSA,DSS, and Other Systems, Advances in Cryptology-CRYPTO\u2019 96, LNCS1109, (1996), 104\u2013113."},{"key":"32_CR12","unstructured":"Kocher, C., Jaffe, J., Jun, B., Introduction to Differential Power Analysis and Related Attacks. Available at \n                    http:\/\/www.cryptography.com\/dpa\/technical \/index.html"},{"key":"32_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"C. Kocher","year":"1999","unstructured":"Kocher, C., Jaffe, J., Jun, B., Differential Power Analysis, Advances in Cryptology-CRYPTO\u2019 99, LNCS1666, (1999), 388\u2013397."},{"key":"32_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/3-540-44709-1_32","volume-title":"Cryptographic Hardware and Embedded System (CHES\u201901)","author":"P.Y. Liardet","year":"2001","unstructured":"Liardet, P.Y., Smart, N.P., Preventing SPA\/DPA in ECC systems using the Jacobi form, Cryptographic Hardware and Embedded System (CHES\u201901), LNCS2162, (2001), 391\u2013401."},{"key":"32_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology-CRYPTO\u2019 85","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S., Use of elliptic curves in cryptography, Advances in Cryptology-CRYPTO\u2019 85, LNCS218,(1986), 417\u2013426."},{"key":"32_CR16","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"Morain, F., Olivos, J., Speeding up the computation on an elliptic curve using addition-subtraction chains, Inform. Theory Appl. 24, (1990), 531\u2013543.","journal-title":"Inform. Theory Appl."},{"key":"32_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45439-X_22","volume-title":"Information Security (ISC2001)","author":"B. M\u00f6ller","year":"2001","unstructured":"M\u00f6ller, B., Securing Elliptic Curve Point Multiplication against Side-Channel Attacks, Information Security (ISC2001), LNCS2200, (2001), 324\u2013334."},{"key":"32_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/3-540-44709-1_5","volume-title":"Cryptographic Hardware and Embedded Systems (CHES\u201901)","author":"E. Oswald","year":"2001","unstructured":"Oswald, E., Aigner, M., Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks, Cryptographic Hardware and Embedded Systems (CHES\u201901), LNCS2162, (2001), 39\u201350."},{"key":"32_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/3-540-45861-1_32","volume-title":"The 4th International Conference on Information Security and Cryptology (ICISC 2001)","author":"K. Okeya","year":"2002","unstructured":"Okeya, K., Miyazaki, K, Sakurai, K., A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-form Elliptic Curve Secure against Side Channel Attacks, The 4th International Conference on Information Security and Cryptology (ICISC 2001), LNCS2288, (2002), 428\u2013439."},{"key":"32_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/3-540-44495-5_16","volume-title":"Progress in Cryptology-INDOCRYPT 2000","author":"K. Okeya","year":"2000","unstructured":"Okeya, K., Sakurai, K., Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack, Progress in Cryptology-INDOCRYPT 2000, LNCS1977, (2000), 178\u2013190."},{"key":"32_CR21","unstructured":"Oswald, E., On Countermeasures against Power Analysis Attacks on Elliptic Curve Cryptosystem, DPA-Workshop organized by the ECC-Brainpool, (2001). Available at \n                    http:\/\/www.iaik.tu-graz.ac.at\/aboutus\/people\/oswald\/index.php"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T15:05:04Z","timestamp":1550329504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_32","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}