{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:46:47Z","timestamp":1725493607426},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540433194"},{"type":"electronic","value":"9783540458616"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45861-1_33","type":"book-chapter","created":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T06:40:01Z","timestamp":1193553601000},"page":"440-456","source":"Crossref","is-referenced-by-count":16,"title":["DPA Countermeasure Based on the \u201cMasking Method\u201d"],"prefix":"10.1007","author":[{"given":"Kouichi","family":"Itoh","sequence":"first","affiliation":[]},{"given":"Masahiko","family":"Takenaka","sequence":"additional","affiliation":[]},{"given":"Naoya","family":"Torii","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,4,23]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Mehdi-Larurent Akkar, Regis Bevan, Paul Dischamp and Didier Moyart, \u201cPower Analysis, What is Now Possible...\u201d, Advances in Cryptology-ASIACRYPT 2000, pp.489\u2013502.","DOI":"10.1007\/3-540-44448-3_38"},{"key":"33_CR2","unstructured":"Mehdi-Larurent Akkar, Chiristophe Giraud, \u201cAn implementation of DES and AES, secure against some attacks\u201d, Cryptographic Hardware and Embedded Systems (CHES 2001)."},{"key":"33_CR3","unstructured":"Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohtagi, \u201cA cautionary note regarding evaluation of AES candidates on smart-cards\u201d, AES round 2."},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Suresh Chari, Charanjit S. Julta, Josyula R. Rao and Pankaj Rohtagi, \u201cTowards Sound Apporoaches to Counteract Power-Analysis Attacks\u201d, Advances in Cryptography-CRYPTO\u201999, pp.398\u2013412.","DOI":"10.1007\/3-540-48405-1_26"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Christophe Clavier and Marc Joye, \u201cUniversal Exponentiation Algorithm-A FirstStep Towards Provable SPA-resistence-\u201d, Cryptographic Hardware and Embedded Systems (CHES 2001).","DOI":"10.1007\/3-540-44709-1_25"},{"key":"33_CR6","unstructured":"Jean-S\u00e9bastein Coron, \u201cResistance against Differential Power Analysis for Elliptic Curve Cryptosystems\u201d, Cryptographic Hardware and Embedded Systems (CHES\u201999), pp.292\u2013302."},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Jean-S\u00e9bastein Coron and Louis Goubin, \u201cOn Boolean and Arithmetic Masking against Differential Power Analysis\u201d, Cryptographic Hardware and Embedded Systems, Cryptographic Hardware and Embedded Systems (CHES 2000), pp.231\u2013237.","DOI":"10.1007\/3-540-44499-8_18"},{"key":"33_CR8","unstructured":"Louis Goubin and Jacques Patarin, \u201cDES and Differential Power Analysis.-The Duplication Method-\u201d, Cryptographic Hardware and Embedded Systems (CHES 2001)."},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Marc Joye and Christphe Tymen, \u201cProtection against Differential Analysis for Elliptic Curve Cryptography-An Algebraic Apporoach-\u201d, Cryptographic Hardware and Embedded Systems (CHES 2001).","DOI":"10.1007\/3-540-44709-1_31"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun \u201cDifferential Power Analysis\u201d, Advances in Cryptography-CRYPTO\u201999, pp.388\u2013397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan \u201cPower Analysis Attacks of Modular Exponentiation in Smartcards.\u201d, Cryptographic Hardware and Embedded Systems (CHES\u201999), pp.144\u2013157.","DOI":"10.1007\/3-540-48059-5_14"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Thomas S. Messerges, \u201cSecuring the AES Finialists Against Power Analysis Attacks\u201d, Fast Software Encryption (FSE 2000), pp.150\u2013164.","DOI":"10.1007\/3-540-44706-7_11"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Thomas S. Messerges, \u201cUsing Second-Order Power Analysis to Attack DPA Resistant Software\u201d, Cryptographic Hardware and Embedded Systems (CHES 2000), pp.238\u2013251.","DOI":"10.1007\/3-540-44499-8_19"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45861-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T02:29:22Z","timestamp":1556936962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45861-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540433194","9783540458616"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45861-1_33","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}