{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:08:38Z","timestamp":1773655718164,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540442707","type":"print"},{"value":"9783540458111","type":"electronic"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45811-5_31","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T05:43:51Z","timestamp":1192772631000},"page":"402-413","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks"],"prefix":"10.1007","author":[{"given":"Bodo","family":"M\u00f6ller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,5]]},"reference":[{"key":"31_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Public Key Cryptography-PKC 2002","author":"\u00c9. Bier","year":"2002","unstructured":"Bier, \u00c9., AND Joye, M. Weierstra\u00df elliptic curves and side-channel attacks. In Public Key Cryptography-PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science, pp. 335\u2013345."},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., DeMillo, R. A., AND Lipton, R. J. On the importance of eliminating errors in cryptographic computations. Journal of Cryptology 14 (2001), 101\u2013119.","journal-title":"Journal of Cryptology"},{"key":"31_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-47555-9_18","volume-title":"Advances in Cryptology-EUROCRYPT\u201992","author":"E. F. Brickell","year":"1993","unstructured":"Brickell, E. F., Gordon, D. M., McCurley, K. S., AND Wilson, D. B. Fast exponentiation with precomputation. In Advances in Cryptology-EUROCRYPT\u201992 (1993), R. A. Rueppel, Ed., vol. 658 of Lecture Notes in Computer Science, pp. 200\u2013207."},{"key":"31_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/3-540-44709-1_25","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2001","author":"C. Clavier","year":"2001","unstructured":"Clavier, C., AND Joye, M. Universalexp onentiation algorithm-a first step towards provable SPA-resistance. In Cryptographic Hardware and Embedded Systems-CHES 2001 (2001), \u00c7. K. Ko\u00e7, D. Naccache, and C. Paar, Eds., vol. 2162 of Lecture Notes in Computer Science, pp. 300\u2013308."},{"key":"31_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems-CHES\u201999","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S. Resistance against differential power analysis for elliptic curve cryptosystems. In Cryptographic Hardware and Embedded Systems-CHES\u201999 (1999), \u00c7. K. Ko\u00e7 and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science, pp. 292\u2013302."},{"key":"31_CR6","unstructured":"Fischer, W., Giraud, C., Knudsen, E. W., AND Jean-Pierre, S. Parallel scalar multiplication on general elliptic curves over Fp hedged against non-differential side-channel attacks. Cryptology ePrint Archive Report 2002\/007, 2002. Available from \nhttp:\/\/eprint.iacr.org\/\n\n."},{"key":"31_CR7","unstructured":"INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS (IEEE). IEEE standard specifications for public-key cryptography. IEEE Std 1363-2000, 2000."},{"key":"31_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-48059-5_7","volume-title":"Cryptographic Hardware and Embedded Systems-CHES\u201999","author":"K. Itoh","year":"1999","unstructured":"Itoh, K., Takenaka, M., Torii, N., Temma, S., AND Kurihara, Y. Fast implementation of public-key cryptography on a DSP TMS320C6201. In Cryptographic Hardware and Embedded Systems-CHES\u201999 (1999), \u00c7. K. Ko\u00e7 and C. Paar, Eds., vol. 1717 of Lecture Notes in Computer Science, pp. 61\u201372."},{"key":"31_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/3-540-45664-3_20","volume-title":"Public Key Cryptography-PKC 2002","author":"T. Izu","year":"2002","unstructured":"Izu, T., AND Takagi, T. A fast parallel elliptic curve multiplication resistant against side channel attacks. In Public Key Cryptography-PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science, pp. 280\u2013296."},{"key":"31_CR10","unstructured":"Knuth, D. E. The Art of Computer Programming-Vol. 2: Seminumerical Algorithms (2nd ed.). Addison-Wesley, 1981."},{"key":"31_CR11","unstructured":"Knuth, D. E. The Art of Computer Programming-Vol. 2: Seminumerical Algorithms (3rd ed.). Addison-Wesley, 1998."},{"key":"31_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology-CRYPTO\u201996","author":"P. C. Kocher","year":"1996","unstructured":"Kocher, P. C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology-CRYPTO\u201996 (1996), N. Koblitz, Ed., vol. 1109 of Lecture Notes in Computer Science, pp. 104\u2013113."},{"key":"31_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"P. C. Kocher","year":"1999","unstructured":"Kocher, P. C., Jaffe, J., AND Jun, B. Differentialp ower analysis. In Advances in Cryptology-CRYPTO\u201999 (1999), M. Wiener, Ed., vol. 1666 of Lecture Notes in Computer Science, pp. 388\u2013397."},{"key":"31_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"T. S. Messerges","year":"2000","unstructured":"Messerges, T. S. Using second-order power analysis to attack DPA resistant software. In Cryptographic Hardware and Embedded Systems-CHES 2000 (2000), \u00c7. K. Ko\u00e7 and C. Paar, Eds., vol. 1965 of Lecture Notes in Computer Science, pp. 238\u2013251."},{"key":"31_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/3-540-45439-X_22","volume-title":"Information Security-ISC 2001","author":"B. M\u00f6ller","year":"2001","unstructured":"M\u00f6ller, B. Securing elliptic curve point multiplication against side-channel attacks. In Information Security-ISC 2001 (2001), G. I. Davida and Y. Frankel, Eds., vol. 2200 of Lecture Notes in Computer Science, pp. 324\u2013334."},{"key":"31_CR16","unstructured":"M\u00f6ller, B. Securing elliptic curve point multiplication against side-channel attacks, addendum: Efficiency improvement. \nhttp:\/\/www.informatik.tu-darmstadt.de\/TI\/Mitarbeiter\/moeller\/ecc-scaisc01_OnlinePDF.pdf\n\n, 2001."},{"key":"31_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P. L. Montgomery","year":"1987","unstructured":"Montgomery, P. L. Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48 (1987), 243\u2013264.","journal-title":"Mathematics of Computation"},{"key":"31_CR18","unstructured":"Okeya, K. Method of calculating multiplication by scalars on an elliptic curve and apparatus using same. European Patent EP1160661, 2001."},{"key":"31_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/3-540-44495-5_16","volume-title":"Progress in Cryptology-INDOCRYPT 2000","author":"K. Okeya","year":"2000","unstructured":"Okeya, K., AND Sakurai, K. Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. In Progress in Cryptology-INDOCRYPT 2000 (2000), B. K. Roy and E. Okamoto, Eds., vol. 1977 of Lecture Notes in Computer Science, pp. 178\u2013190."},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Okeya, K., AND Sakurai, K. A second-order DPA attack breaks a window-method based countermeasure against side channel attacks. In Information Security-ISC 2002 (these proceedings), A. H. Chan and V. Gligor, Eds.","DOI":"10.1007\/3-540-45811-5_30"},{"key":"31_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/3-540-45664-3_19","volume-title":"Public Key Cryptography-PKC 2002","author":"W. Schindler","year":"2002","unstructured":"Schindler, W. A combined timing and power attack. In Public Key Cryptography-PKC 2002 (2002), D. Naccache and P. Paillier, Eds., vol. 2274 of Lecture Notes in Computer Science, pp. 263\u2013279."},{"key":"31_CR22","unstructured":"Vadekar, A., AND Lambert, R. J. Timing attack resistant cryptographic system. Patent Cooperation Treaty (PCT) Publication WO 00\/05837, 2000."},{"key":"31_CR23","unstructured":"Vanstone, S. A., AND Gallant, R. P. Power signature attack resistant cryptography. Patent Cooperation Treaty (PCT) Publication WO 00\/25204, 2000."},{"key":"31_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/3-540-45353-9_15","volume-title":"Progress in Cryptology-CT-RSA 2001","author":"C. D. Walter","year":"2001","unstructured":"Walter, C. D., AND Thompson, S. Distinguishing exponent digits by observing modular subtractions. In Progress in Cryptology-CT-RSA 2001 (2001), D. Naccache, Ed., vol. 2020 of Lecture Notes in Computer Science, pp. 192\u2013207."},{"key":"31_CR25","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1137\/0205008","volume":"5","author":"A. C.-C. Yao","year":"1976","unstructured":"Yao, A. C.-C. On the evaluation of powers. SIAM Journal on Computing 5 (1976), 100\u2013103.","journal-title":"SIAM Journal on Computing"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45811-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T18:02:48Z","timestamp":1580148168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45811-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442707","9783540458111"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-45811-5_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"5 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}