{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:25:33Z","timestamp":1742383533093},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540423003"},{"type":"electronic","value":"9783540477198"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-47719-5_11","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T01:15:16Z","timestamp":1180746916000},"page":"115-129","source":"Crossref","is-referenced-by-count":28,"title":["Non-deterministic Processors"],"prefix":"10.1007","author":[{"given":"David","family":"May","sequence":"first","affiliation":[]},{"given":"Henk L.","family":"Muller","sequence":"additional","affiliation":[]},{"given":"Nigel P.","family":"Smart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,4]]},"reference":[{"key":"11_CR1","unstructured":"R Anderson and M. Kuhn. Tamper Resistance-a Cautionary Note. The Second USENIX Workshop on Electronic Commerce Proceedings pp 1\u201311, Oakland, California, November 18\u201321, 1996."},{"key":"11_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R. Anderson","year":"1997","unstructured":"R. Anderson and M. Kuhn. Low Cost Attacks on Tamper Resistant Devices. Security Protocols, Springer LNCS 1361, pp 125\u2013136, 1997."},{"key":"11_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology, CRYPTO\u2019 99","author":"S. Chari","year":"1999","unstructured":"S. Chari, C.S. Jutla, J.R. Rao and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. Advances in Cryptology, CRYPTO\u2019 99, Springer LNCS 1666, pp 398\u2013412, 1999."},{"key":"11_CR4","unstructured":"S. Chari, C.S. Jutla, J.R. Rao and P. Rohatgi. A cautionary note regarding evaluation of AES candidates on Smart-Cards. Second Advanced Encryption Standard Candidate Conference, Rome March 1999."},{"key":"11_CR5","unstructured":"C. Clapp. Instruction level parallelism in AES Candidates. Second Advanced Encryption Standard Candidate Conference, Rome March 1999."},{"key":"11_CR6","unstructured":"FIPS 46. Data Encryption Standard. NIST, 1977 Revised as FIPS 46-1:1988; FIPS 46-2:1993"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"J.A. Fisher, J.R. Ellis, J.C. Ruttenberg and A. Nicolau. Parallel Processing: A Smart Compiler and a Dumb Machine. SIGPLAN84, 37\u201347, ACM, 1984.","DOI":"10.1145\/502949.502878"},{"key":"11_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"L. Goubin and J. Patarin. DES and differential power analysis. The \u201cduplication method\u201d. Cryptographic Hardware and Embedded Systems, Springer LNCS 1717, pp 158\u2013172, 1999."},{"key":"11_CR9","volume-title":"Computer architecture: a quantitative approach","author":"J.L. Hennessy","year":"1990","unstructured":"J.L. Hennessy and D.A. Patterson. Computer architecture: a quantitative approach. Morgan Kaufmann Publishers, Palo Alto, California, 1990."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"N. P. Jouppi and D. W. Wall. Available instruction-level parallelism for superscalar and superpipelined machines. ASPLOS-III, 272\u2013282, 1989.","DOI":"10.1145\/68182.68207"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz. Elliptic curve cryptosystems. Math. Comp., 48, 203\u2013209, 1987.","journal-title":"Math. Comp."},{"key":"11_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology, CRYPTO\u2019 96","author":"P. Kocher","year":"1996","unstructured":"P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. Advances in Cryptology, CRYPTO\u2019 96, Springer LNCS 1109, pp 104\u2013113, 1996."},{"key":"11_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology, CRYPTO\u2019 99","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. Advances in Cryptology, CRYPTO\u2019 99, Springer LNCS 1666, pp 388\u2013397, 1999."},{"key":"11_CR14","unstructured":"O. K\u00f6mmerling and M. Kuhn. Design Principles for Tamper-Resistant Smartcard Processors. USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10\u201311, 1999."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"D. May, H.L. Muller and N.P. Smart. Random Register Renaming to Foil DPA. To appear Crytographic Hardware and Embedded Systems-CHES 2001.","DOI":"10.1007\/3-540-44709-1_4"},{"key":"11_CR16","series-title":"Lect Notes Comput Sci","first-page":"47","volume-title":"Advances in Cryptology, CRYPTO-\u2019 85","author":"V. Miller","year":"1986","unstructured":"V. Miller. Use of elliptic curves in cryptography. Advances in Cryptology, CRYPTO-\u2019 85, Springer-Verlag LNCS 218, 47\u2013426, 1986."},{"key":"11_CR17","unstructured":"R. Rivest, A. Shamir and L. Adleman. Cryptographic communications system and method. US Patent 4,405,829, 1983."},{"key":"11_CR18","unstructured":"N. Sidwell. A computer system for executing branch instructions. European 0 689 131 A1, US 08\/493103."},{"key":"11_CR19","unstructured":"D Sima, T Foutain and P Kacsuk. Advanced Computer Architectures. Addison Wesley, 1997."},{"key":"11_CR20","unstructured":"N. Weste and K. Eshraghian. Principles of CMOS VLSI design. Addison Wesley, ISBN 0-201-53376-6, 1993."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47719-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:07:15Z","timestamp":1556453235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47719-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540423003","9783540477198"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-47719-5_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}