{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T11:16:26Z","timestamp":1775214986939,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540666462","type":"print"},{"value":"9783540480594","type":"electronic"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48059-5_25","type":"book-chapter","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T18:18:49Z","timestamp":1195237129000},"page":"292-302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":570,"title":["Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems"],"prefix":"10.1007","author":[{"given":"Jean-S\u00e9bastien","family":"Coron","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,2,8]]},"reference":[{"key":"25_CR1","unstructured":"E. Biham, A. Shamir. Power analysis of the key scheduling of the AES candidates, Proceedings of the second AES Candidate Conference, March 1999, pp. 115\u2013121."},{"key":"25_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-47555-9_18","volume-title":"Advances in Cryptology-Eurocrypt\u2019 92","author":"E. Brickell","year":"1993","unstructured":"E. Brickell, D. Gordon, K. McCurley, D. Wilson. Fast Exponentiation with Pre-computation (Extended Abstract), Advances in Cryptology-Eurocrypt\u2019 92, LNCS 658 (1993), Springer-Verlag, pp.200\u2013207."},{"key":"25_CR3","unstructured":"S. Chari, C. Jutla, J.R. Rao, P. Rohatgi. A cautionary note regarding evaluation of AES candidates on smart-cards, Proceedings of the second AES Candidate Conference, March 1999, pp. 133\u2013147."},{"issue":"10","key":"25_CR4","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"D. Chaum. Security without identification: transaction systems to make Big Brother obsolete, Communications of the ACM, vol.28, n.10, Oct 1985, pp.1030\u20131044.","journal-title":"Communications of the ACM"},{"key":"25_CR5","unstructured":"J. Daemen, V. Rijmen. Resistance against implementation attacks A comparative study of the AES proposals, Proceedings of the second AES Candidate Conference, March 1999, pp. 122\u2013132."},{"key":"25_CR6","volume-title":"Data encryption standard, Federal Information Processing Standards Publication","author":"FIPS 46","year":"1977","unstructured":"FIPS 46, Data encryption standard, Federal Information Processing Standards Publication 46, U.S. Department of Commerce\/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1977."},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. New directions in cryptography, IEEE Trans. Info. Theory, IT-22, 1976, pp 644\u2013654.","journal-title":"IEEE Trans. Info. Theory"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. El Gamal","year":"1985","unstructured":"T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Info. Theory, IT-31, 1985, pp 469\u2013472.","journal-title":"IEEE Trans. Info. Theory"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"D.M. Gordon. A Survey of Fast Exponentiation Methods, Journal of Algorithms 27, 129\u2013146 (1998).","journal-title":"Journal of Algorithms"},{"key":"25_CR10","unstructured":"IEEE P1363\/D7. Standard Specifications for Public Key Cryptography. September 11, 1998."},{"key":"25_CR11","unstructured":"D.E. Knuth, Seminumerical Algorithms, The Art of Computer Programming,2 Addison Wesley, 1969."},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz. Elliptic Curve Cryptosystems, Mathematics of Computation, vol. 48, 1987, pp. 203\u2013209.","journal-title":"Mathematics of Computation"},{"key":"25_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology, Proceedings of Crypto\u201996","author":"P. Kocher","year":"1996","unstructured":"Paul Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems, Advances in Cryptology, Proceedings of Crypto\u201996, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 104\u2013113."},{"key":"25_CR14","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun, Introduction to Differential Power Analysis and Related Attacks, \nhttp:\/\/www.cryptography.com\/dpa\/technical\n\n, 1998."},{"key":"25_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-48071-4_25","volume-title":"Advances in Cryptology-Proceedings of Crypto\u2019 92","author":"K. Koyama","year":"1993","unstructured":"K. Koyama, Y. Tsuruoka, Speeding up elliptic cryptosystems by using a signed binary window method, Advances in Cryptology-Proceedings of Crypto\u2019 92, LNCS 740, pp. 345\u2013357, Springer-Verlag, Berlin\/New-York, 1993."},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"A. J. Menezes, \u201cElliptic Curve Public Key Cryptosystems\u201d, Kluwer Academic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"25_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Proceedings of Crypto 85","author":"V.S. Miller","year":"1986","unstructured":"V.S. Miller. Use of Elliptic Curves in Cryptography, Proceedings of Crypto 85, LNCS 218, Springer, 1986, pp. 417\u2013426."},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"F. Morain, J. Olivos. Speeding up the computation of an elliptic curve using addition-subtraction chains, Inform. Theory Appl. 24 (1990), 531\u2013543.","journal-title":"Inform. Theory Appl."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48059-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T09:49:44Z","timestamp":1589881784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48059-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666462","9783540480594"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-48059-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"8 February 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}