{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:49:00Z","timestamp":1743047340286,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":70,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461468585"},{"type":"electronic","value":"9781461468592"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-6859-2_7","type":"book-chapter","created":{"date-parts":[[2013,6,19]],"date-time":"2013-06-19T16:35:53Z","timestamp":1371659753000},"page":"223-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Signal Processing for Cryptography and Security Applications"],"prefix":"10.1007","author":[{"given":"Miroslav","family":"Kne\u017eevi\u0107","sequence":"first","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]},{"given":"Elke","family":"De Mulder","sequence":"additional","affiliation":[]},{"given":"Junfeng","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Benedikt","family":"Gierlichs","sequence":"additional","affiliation":[]},{"given":"Yong Ki","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Roel","family":"Maes","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,10]]},"reference":[{"key":"7_CR1","unstructured":"Advances in Cryptology - CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15\u201319, 1999, Proceedings, Lecture Notes in Computer Science, vol.\u00a01666. Springer (1999)"},{"key":"7_CR2","unstructured":"Cryptographic Hardware and Embedded Systems\u2014CHES 2006, 8th International Workshop, Yokohama, Japan, October 10\u201313, 2006, Proceedings, Lecture Notes in Computer Science, vol.\u00a04249. Springer (2006)"},{"key":"7_CR3","unstructured":"Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10\u201313, 2008. Proceedings, Lecture Notes in Computer Science, vol.\u00a05154. Springer (2008)"},{"key":"7_CR4","unstructured":"Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings, Lecture Notes in Computer Science, vol.\u00a06917. Springer (2011)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side-Channel(s). In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02002, Lecture Notes in Computer Science, vol.\u00a02523, pp.\u00a029\u201345. Springer (2002)","DOI":"10.1007\/3-540-36400-5_4"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Baktir, S., Kumar, S., Paar, C., Sunar, B.: A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain. In: Mobile Networks and Applications (MONET) Journal, Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing, pp.\u00a0259\u2013270 (2007)","DOI":"10.1007\/s11036-007-0022-4"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Barenghi, A., Pelosi, G., Teglia, Y.: Improving First Order Differential Power Attacks through Digital Signal Processing. In: Proceedings of the 3rd international conference on Security of information and networks, SIN 2010, pp.\u00a0124\u2013133. ACM (2010)","DOI":"10.1145\/1854099.1854126"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Barrett, P.: Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In: Advances in Cryptology\u2014CRYPTO\u00a0\u201986, Lecture Notes in Computer Science, vol.\u00a0263, pp.\u00a0311\u2013323. Springer (1987)","DOI":"10.1007\/3-540-47721-7_24"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Batina, L., Gierlichs, B., Lemke-Rust, K.: Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. In: Proceedings of the 11th international conference on Information Security\u2014ISC 2008, Lecture Notes in Computer Science, vol.\u00a05222, pp.\u00a0341\u2013354. Springer (2008)","DOI":"10.1007\/978-3-540-85886-7_24"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C.H. Bennett","year":"1988","unstructured":"Bennett, C.H., Brassard, G., Robert, J.M.: Privacy Amplification by Public Discussion. SIAM Journal on Computing 17(2), 210\u2013229 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Brickell, E.F.: A Survey of Hardware Implementations of RSA. In: Advances in Cryptology\u2014CRYPTO\u00a0\u201989, Lecture Notes in Computer Science, vol.\u00a0435, pp.\u00a0368\u2013370. Springer (1990)","DOI":"10.1007\/0-387-34805-0_34"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02004, Lecture Notes in Computer Science, vol.\u00a03156, pp.\u00a016\u201329. Springer (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Carter, J.L., Wegman, M.N.: Universal Classes of Hash Functions. In: STOC \u201977: Proceedings of the 9th ACM symposium on Theory of computing, pp.\u00a0106\u2013112. ACM (1977)","DOI":"10.1145\/800105.803400"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Advances in Cryptology\u2014CRYPTO\u00a0\u201999 [1], pp.\u00a0398\u2013412","DOI":"10.1007\/3-540-48405-1_26"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Cheung, R., Duquesne, S., Fan, J., Guillermin, N., Verbauwhede, I., Yao, G.: FPGA Implementation of Pairing using Residue Number System and Lazy reduction. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02011 [4], pp.\u00a0421\u2013441","DOI":"10.1007\/978-3-642-23951-9_28"},{"key":"7_CR16","unstructured":"Competition, S..: http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Coron, J.S., Kocher, P.C., Naccache, D.: Statistics and Secret Leakage. In: Financial Cryptography, 4th International Conference, Lecture Notes in Computer Science, vol.\u00a01962, pp.\u00a0157\u2013173. Springer (2000)","DOI":"10.1007\/3-540-45472-1_12"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"7_CR19","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y. Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal on Computing 38(1), 97\u2013139 (2008)","journal-title":"SIAM Journal on Computing"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Dusse, S.R., Jr., B.S.K.: A Cryptographic Library for the Motorola DSP56000. In: Advances in Cryptology\u2014CRYPTO\u00a0\u201990, Lecture Notes in Computer Science, vol.\u00a0537, pp.\u00a0230\u2013244. Springer (1991)","DOI":"10.1007\/3-540-46877-3_21"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Ercegovac, M.D.: On-line Arithmetic: An Overview. In: SPIE Real-Time Signal Processing VII, pp.\u00a086\u201393 (1984)","DOI":"10.1117\/12.944012"},{"key":"7_CR22","unstructured":"Ercegovac, M.D., Lang, T.: On-line Arithmetic for DSP Applications. In: 32nd IEEE Midwest Symposium on Circuits and Systems (1989)"},{"issue":"3","key":"7_CR23","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s10617-008-9021-3","volume":"12","author":"J. Fan","year":"2008","unstructured":"Fan, J., Sakiyama, K., Verbauwhede, I.: Elliptic Curve Cryptography on Embedded Multicore Systems. Design Automation for Embedded Systems 12(3), 231\u2013242 (2008)","journal-title":"Design Automation for Embedded Systems"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon Physical Random Functions. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp.\u00a0148\u2013160. ACM (2002). DOI\u00a0http:\/\/doi.acm.org\/10.1145\/586110.586132","DOI":"10.1145\/586110.586132"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Gastaldo, P., Parodi, G., Zunino, R.: Enhanced Montgomery Multiplication on DSP Architectures for Embedded Public-Key Cryptosystems. EURASIP J. Embedded Syst. pp.\u00a01\u20139 (2008). DOI\u00a0http: \/\/dx.doi.org\/10.1155\/2008\/583926","DOI":"10.1155\/2008\/583926"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Gebotys, C.H., Ho, S., Tiu, C.C.: EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02005, Lecture Notes in Computer Science, vol.\u00a03659, pp.\u00a0250\u2013264. Springer (2005)","DOI":"10.1007\/11545262_19"},{"issue":"4","key":"7_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1376804.1376812","volume":"7","author":"C.H. Gebotys","year":"2008","unstructured":"Gebotys, C.H., White, B.A.: EM Analysis of a Wireless Java-Based PDA. ACM Transactions on Embedded Computing Systems 7(4), 1\u201328 (2008)","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis - A Generic Side-Channel Distinguisher. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02008 [3], pp.\u00a0426\u2013442","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"7_CR29","first-page":"135","volume":"7","author":"D. Gollmann","year":"1998","unstructured":"Gollmann, D., Han, Y., Mitchell, C.: Redundant integer representation and fast exponentiation. Designs, Codes and Cryptography 7, 135\u2013151 (1998)","journal-title":"Designs, Codes and Cryptography"},{"key":"7_CR30","unstructured":"Gro\u00dfsch\u00e4dl, J., Posch, K.C., Tillich, S.: Architectural Enhancements to Support Digital Signal Processing and Public-Key Cryptography. In: Proceedings of the 2nd Workshop on Intelligent Solutions in Embedded Systems\u2014WISES 2004, pp.\u00a0129\u2013143 (2004)"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Blumel, R., Krieger, U., Paar, C.: Effcient implementation of elliptic curve cryptosystems on the TI MSP 430x33x family of microcontrollers. In: Public Key Cryptography, Lecture Notes in Computer Science, vol.\u00a01992, pp.\u00a0365\u2013382. Springer (2001)","DOI":"10.1007\/3-540-44586-2_27"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02007, Lecture Notes in Computer Science, vol.\u00a04727, pp.\u00a063\u201380. Springer (2007)","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Guillermin, N.: A High Speed Coprocessor for elliptic curve scalar multiplication over Fp. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02010, Lecture Notes in Computer Science, vol.\u00a06225, pp.\u00a048\u201364. Springer (2010)","DOI":"10.1007\/978-3-642-15031-9_4"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"G\u00fcneysu, T., Paar, C.: Ultra High Performance ECC over NIST Primes on Commercial FPGAs. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02008 [3], pp.\u00a062\u201378","DOI":"10.1007\/978-3-540-85053-3_5"},{"key":"7_CR35","unstructured":"Gustafsson, O., Wanhammar, L.: Arithmetic. In: S.S. Bhattacharyya, E.F. Deprettere, R.\u00a0Leupers, J.\u00a0Takala (eds.) Handbook of Signal Processing Systems, second edn. Springer (2012)"},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID\u2014A Proof in Silicon. In: Selected Areas in Cryptography\u2014SAC\u00a02008, Lecture Notes in Computer Science, vol.\u00a05381, pp.\u00a0401\u2013413. Springer (2009)","DOI":"10.1007\/978-3-642-04159-4_26"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Homma, N., Nagashima, S., Imai, Y., Aoki, T., Satoh, A.: High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02006 [2], pp.\u00a0187\u2013200","DOI":"10.1007\/11894063_15"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Itoh, K., Takenaka, M., Torii, N., Temma, S., Kurihara, Y.: Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a01999, Lecture Notes in Computer Science, vol.\u00a01717, pp.\u00a061\u201372. Springer (1999)","DOI":"10.1007\/3-540-48059-5_7"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: CCS \u201999: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp.\u00a028\u201336. ACM Press (1999)","DOI":"10.1145\/319709.319714"},{"key":"7_CR40","unstructured":"Kalach, K., David, J.P.: Hardware Implementation of Large Number Multiplication by FFT with Modular Arithmetic. In: 3rd International IEEE-NEWCAS Conference, pp.\u00a0267\u2013270. IEEE (2005)"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Kasper, T., Oswald, D., Paar, C.: Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation. In: Workshop on RFID Security and Privacy, Lecture Notes in Computer Science. Springer (2011). To appear","DOI":"10.1007\/978-3-642-25286-0_5"},{"key":"7_CR42","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystem. Math. Comp. 48, 203\u2013209 (1987)","journal-title":"Elliptic Curve Cryptosystem. Math. Comp."},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: A Family of Jacobians Suitable for Discrete Log Cryptosystems. In: Advances in Cryptology\u2014CRYPTO\u00a0\u201988, Lecture Notes in Computer Science, vol.\u00a0403, pp.\u00a094\u201399. Springer (1988)","DOI":"10.1007\/0-387-34799-2_8"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"\u00c7.K. Ko\u00e7, Acar, T., Kaliski\u00a0Jr., B.: Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro pp.\u00a026\u201333 (1996)","DOI":"10.1109\/40.502403"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Advances in Cryptology\u2014CRYPTO\u00a0\u201999 [1], pp.\u00a0388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"4","key":"7_CR46","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIFS.2007.910252","volume":"2","author":"T.H. Le","year":"2007","unstructured":"Le, T.H., Cl\u00e9di\u00e8re, J., Servi\u00e8re, C., Lacoume, J.L.: Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant. IEEE Transactions on Information Forensics and Security 2(4), 710\u2013720 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Chan, H., Verbauwhede, I.: Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class. Journal of Signal Processing Systems 53, 89\u2013102 (2008). DOI\u00a010.1007\/s11265-008-0168-8. URL http:\/\/portal.acm.org\/citation.cfm?id=1452776.1452783","DOI":"10.1007\/s11265-008-0168-8"},{"key":"7_CR48","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Kne\u017eevi\u0107, M., Verbauwhede, I.: Hardware Design for Hash functions. In: Secure Integrated Circuits and Systems, Integrated Circuits and Systems, pp.\u00a079\u2013104. Springer (2010)","DOI":"10.1007\/978-0-387-71829-3_5"},{"issue":"11","key":"7_CR49","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.1109\/TC.2008.148","volume":"57","author":"Y.K. Lee","year":"2008","unstructured":"Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic-Curve-Based Security Processor for RFID. IEEE Transaction on Computers 57(11), 1514\u20131527 (2008)","journal-title":"IEEE Transaction on Computers"},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Linnartz, J.P., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: 4th international conference on Audio- and Video-based Biometric Person Authentication\u2014AVBPA\u201903, pp.\u00a0393\u2013402 (2003)","DOI":"10.1007\/3-540-44887-X_47"},{"key":"7_CR51","doi-asserted-by":"crossref","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Soft decision helper data algorithm for SRAM PUFs. In: Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3, ISIT 2009, pp.\u00a02101\u20132105. IEEE (2009)","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"7_CR52","doi-asserted-by":"crossref","unstructured":"Maes, R., Verbauwhede, I.: Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. In: Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp.\u00a03\u201337. Springer (2010)","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"7_CR53","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1997)"},{"key":"7_CR54","doi-asserted-by":"crossref","unstructured":"Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Efficient Pipelining for Modular Multiplication Architectures in Prime Fields. In: GLSVLSI 2007: Proceedings of the 17th ACM Great Lakes symposium on VLSI, pp.\u00a0534\u2013539. ACM (2007)","DOI":"10.1145\/1228784.1228911"},{"issue":"5","key":"7_CR55","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T. Messerges","year":"2002","unstructured":"Messerges, T., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers 51(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"},{"key":"7_CR56","doi-asserted-by":"crossref","unstructured":"Miller, V.: Uses of Elliptic Curves in Cryptography. In: Advances in Cryptology\u2014CRYPTO\u00a0\u201985, Lecture Notes in Computer Science, vol.\u00a0218, pp.\u00a0417\u2013426. Springer (1986)","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"170","key":"7_CR57","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P. Montgomery","year":"1985","unstructured":"Montgomery, P.: Modular Multiplication without Trial Division. Mathematics of Computation 44(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"7_CR58","doi-asserted-by":"crossref","unstructured":"Morozov, S., Tergino, C., Schaumont, P.: System integration of Elliptic Curve Cryptography on an OMAP platform. Symposium on Application Specific Processors pp.\u00a052\u201357 (2011). DOI\u00a0http:\/\/doi. ieeecomputersociety.org\/10.1109\/SASP.2011.5941077","DOI":"10.1109\/SASP.2011.5941077"},{"key":"7_CR59","doi-asserted-by":"crossref","unstructured":"Muijrers, R., Woudenberg, J.V., Batina, L.: RAM: Rapid Alignment Method. In: Smart Card Research and Advanced Applications\u2014CARDIS\u00a02011, Lecture Notes in Computer Science. Springer (2011). To appear","DOI":"10.1007\/978-3-642-27257-8_17"},{"key":"7_CR60","doi-asserted-by":"crossref","unstructured":"Oswald, D., Paar, C.: Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02011 [4], pp.\u00a0207\u2013222","DOI":"10.1007\/978-3-642-23951-9_14"},{"key":"7_CR61","volume-title":"VLSI","author":"K. Parhi","year":"1999","unstructured":"Parhi, K.: VLSI Digital Signal Processing Systems: Design and Implementation. Weley (1999)"},{"key":"7_CR62","doi-asserted-by":"crossref","unstructured":"Parhi, K.K., Chen, Y.: Signal flow graphs and data flow graphs. In: S.S. Bhattacharyya, E.F. Deprettere, R.\u00a0Leupers, J.\u00a0Takala (eds.) Handbook of Signal Processing Systems, second edn. Springer (2012)","DOI":"10.1007\/978-1-4614-6859-2_39"},{"key":"7_CR63","unstructured":"Pelletier, H., Charvet, X.: Improving the DPA Attack using Wavelet Transform. NIST Physical Security Testing Workshop (2005). URL http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/documents\/fips140-3\/physec\/papers\/physecpaper14.pdf"},{"issue":"5","key":"7_CR64","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/71.382314","volume":"6","author":"K. Posch","year":"1998","unstructured":"Posch, K., Posch, R.: Modulo reduction in residue number systems. IEEE Transactions on Parallel and Distributed Systems 6(5), 449\u2013454 (1998)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"7_CR65","unstructured":"Project, S.: http:\/\/www.speedproject.eu\/"},{"issue":"2","key":"7_CR66","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"7_CR67","doi-asserted-by":"crossref","unstructured":"Sakiyama, K., Batina, L., Preneel, B., Verbauwhede, I.: Superscalar Coprocessor for High-Speed Curve-Based Cryptography. In: Cryptographic Hardware and Embedded Systems\u2014CHES\u00a02006 [2], pp.\u00a0415\u2013429","DOI":"10.1007\/11894063_33"},{"key":"7_CR68","volume-title":"Use of Embedded FPGA Resources in Implementations of Five Round Three SHA-3 Candidates","author":"M.U. Sharif","year":"2011","unstructured":"Sharif, M.U., Shahid, R., Rogawski, M., Gaj, K.: Use of Embedded FPGA Resources in Implementations of Five Round Three SHA-3 Candidates. In: Ecrypt II Hash Workshop (2011)"},{"key":"7_CR69","volume-title":"Residue","author":"M.A. Soderstrand","year":"1986","unstructured":"Soderstrand, M.A., Jenkins, W.K., Jullien, G.A., Taylor, F.J.: Residue Number System Arithmetic: Modern Applications in Digital Signal Processing. IEEE Press (1986)"},{"key":"7_CR70","doi-asserted-by":"crossref","unstructured":"van Woudenberg, J., Witteman, M., Bakker, B.: Improving Differential Power Analysis by Elastic Alignment. In: Topics in Cryptology\u2014CT-RSA\u00a02011, Lecture Notes in Computer Science, vol.\u00a06558, pp.\u00a0104\u2013119. Springer (2011)","DOI":"10.1007\/978-3-642-19074-2_8"}],"container-title":["Handbook of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-6859-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T18:00:02Z","timestamp":1676656802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-6859-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9781461468585","9781461468592"],"references-count":70,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-6859-2_7","relation":{},"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"10 May 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}