{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:16:54Z","timestamp":1742991414333,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319667867"},{"type":"electronic","value":"9783319667874"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66787-4_32","type":"book-chapter","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T13:06:02Z","timestamp":1503579962000},"page":"665-686","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Four$$\\mathbb {Q}$$ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Liu","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Longa","sequence":"additional","affiliation":[]},{"given":"Geovandro C. C. F.","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Reparaz","sequence":"additional","affiliation":[]},{"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,25]]},"reference":[{"key":"32_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/10958513_17","volume-title":"Information Security","author":"T Akishita","year":"2003","unstructured":"Akishita, T., Takagi, T.: Zero-value point attacks on elliptic curve cryptosystem. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 218\u2013233. Springer, Heidelberg (2003). doi:\n                      10.1007\/10958513_17"},{"key":"32_CR2","unstructured":"ARM Limited: Cortex-M4 technical reference manual (2009\u20132010). \n                      http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0439b\/DDI0439B_cortex_m4_r0p0_trm.pdf"},{"key":"32_CR3","unstructured":"Avanzi, R.M.: Side channel attacks on implementations of curve-based cryptographic primitives. IACR Cryptology ePrint Archive, Report 2005\/017 (2005). \n                      http:\/\/eprint.iacr.org\/2005\/017"},{"key":"32_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted Edwards curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 389\u2013405. Springer, Heidelberg (2008). doi:\n                      10.1007\/978-3-540-68164-9_26"},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"I Biehl","year":"2000","unstructured":"Biehl, I., Meyer, B., M\u00fcller, V.: Differential fault attacks on elliptic curve cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 131\u2013146. Springer, Heidelberg (2000). doi:\n                      10.1007\/3-540-44598-6_8"},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). doi:\n                      10.1007\/978-3-540-28632-5_2"},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). doi:\n                      10.1007\/3-540-48405-1_26"},{"key":"32_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). doi:\n                      10.1007\/3-540-36400-5_3"},{"key":"32_CR9","unstructured":"Ciet, M.: Aspects of fast and secure arithmetics for elliptic curve cryptography. Ph.D. thesis, Universit\u00e9 Catholique de Louvain, Louvain-la-Neuve (2003)"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-540-39927-8_32","volume-title":"Information and Communications Security","author":"M Ciet","year":"2003","unstructured":"Ciet, M., Joye, M.: (Virtually) Free randomization techniques for elliptic curve cryptography. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 348\u2013359. Springer, Heidelberg (2003). doi:\n                      10.1007\/978-3-540-39927-8_32"},{"key":"32_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/3-540-36400-5_39","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M Ciet","year":"2003","unstructured":"Ciet, M., Quisquater, J.-J., Sica, F.: Preventing differential analysis in GLV elliptic curve scalar multiplication. In: Kaliski, B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 540\u2013550. Springer, Heidelberg (2003). doi:\n                      10.1007\/3-540-36400-5_39"},{"key":"32_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-642-17650-0_5","volume-title":"Information and Communications Security","author":"C Clavier","year":"2010","unstructured":"Clavier, C., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Horizontal correlation analysis on exponentiation. In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 46\u201361. Springer, Heidelberg (2010). doi:\n                      10.1007\/978-3-642-17650-0_5"},{"key":"32_CR13","unstructured":"Cooper, J., DeMulder, E., Goodwill, G., Jaffe, J., Kenworthy, G., Rohatgi, P.: Test Vector Leakage Assessment (TVLA) methodology in practice. In: International Cryptographic Module Conference (2013)"},{"key":"32_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45472-1_12","volume-title":"Financial Cryptography","author":"J-S Coron","year":"2001","unstructured":"Coron, J.-S., Kocher, P., Naccache, D.: Statistics and secret leakage. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 157\u2013173. Springer, Heidelberg (2001). doi:\n                      10.1007\/3-540-45472-1_12"},{"key":"32_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J-S Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292\u2013302. Springer, Heidelberg (1999). doi:\n                      10.1007\/3-540-48059-5_25"},{"key":"32_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-662-48797-6_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"C Costello","year":"2015","unstructured":"Costello, C., Longa, P.: Four$$\\mathbb{Q}$$: four-dimensional decompositions on a $$\\mathbb{Q}$$-curve over the Mersenne prime. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9452, pp. 214\u2013235. Springer, Heidelberg (2015). doi:\n                      10.1007\/978-3-662-48797-6_10\n                      \n                    . Full version: \n                      https:\/\/eprint.iacr.org\/2015\/565"},{"key":"32_CR17","unstructured":"Costello, C., Longa, P.: Four$$\\mathbb{Q}$$lib (2015\u20132017). \n                      https:\/\/github.com\/Microsoft\/FourQlib"},{"key":"32_CR18","unstructured":"Costello, C., Longa, P.: Schnorr$$\\mathbb{Q}$$: Schnorr signatures on Four$$\\mathbb{Q}$$. MSR Technical report (2016). \n                      https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/07\/SchnorrQ.pdf"},{"issue":"2\u20133","key":"32_CR19","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s10623-015-0087-1","volume":"77","author":"M D\u00fcll","year":"2015","unstructured":"D\u00fcll, M., Haase, B., Hinterw\u00e4lder, G., Hutter, M., Paar, C., S\u00e1nchez, A.H., Schwabe, P.: High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. Des. Codes Crypt. 77(2\u20133), 493\u2013514 (2015)","journal-title":"Des. Codes Crypt."},{"key":"32_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-28368-0_18","volume-title":"Cryptography and Security: From Theory to Applications","author":"J Fan","year":"2012","unstructured":"Fan, J., Verbauwhede, I.: An updated survey on secure ECC implementations: attacks, countermeasures and cost. In: Naccache, D. (ed.) Cryptography and Security: From Theory to Applications. LNCS, vol. 6805, pp. 265\u2013282. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-28368-0_18"},{"issue":"1","key":"32_CR21","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s13389-014-0085-7","volume":"5","author":"A Faz-Hern\u00e1ndez","year":"2015","unstructured":"Faz-Hern\u00e1ndez, A., Longa, P., S\u00e1nchez, A.H.: Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves (extended version). J. Cryptogr. Eng. 5(1), 31\u201352 (2015)","journal-title":"J. Cryptogr. Eng."},{"key":"32_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-13039-2_1","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2014","author":"B Feix","year":"2014","unstructured":"Feix, B., Roussellet, M., Venelli, A.: Side-channel analysis on blinded regular scalar multiplications. In: Meier, W., Mukhopadhyay, D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 3\u201320. Springer, Cham (2014). doi:\n                      10.1007\/978-3-319-13039-2_1"},{"key":"32_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-540-45238-6_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"P-A Fouque","year":"2003","unstructured":"Fouque, P.-A., Valette, F.: The doubling attack \u2013 why upwards is better than downwards. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 269\u2013280. Springer, Heidelberg (2003). doi:\n                      10.1007\/978-3-540-45238-6_22"},{"issue":"4","key":"32_CR24","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.jsc.2011.09.003","volume":"47","author":"P Gaudry","year":"2012","unstructured":"Gaudry, P., Schost, E.: Genus 2 point counting over prime fields. J. Symb. Comput. 47(4), 368\u2013400 (2012)","journal-title":"J. Symb. Comput."},{"key":"32_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36288-6_15","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"L Goubin","year":"2003","unstructured":"Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 199\u2013211. Springer, Heidelberg (2003). doi:\n                      10.1007\/3-540-36288-6_15"},{"key":"32_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-10628-6_17","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"CPL Gouv\u00eaa","year":"2009","unstructured":"Gouv\u00eaa, C.P.L., L\u00f3pez, J.: Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 248\u2013262. Springer, Heidelberg (2009). doi:\n                      10.1007\/978-3-642-10628-6_17"},{"key":"32_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-319-16715-2_23","volume-title":"Topics in Cryptology \u2014 CT-RSA 2015","author":"N Hanley","year":"2015","unstructured":"Hanley, N., Kim, H., Tunstall, M.: Exploiting collisions in addition chain-based exponentiation algorithms using a single trace. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 431\u2013448. Springer, Cham (2015). doi:\n                      10.1007\/978-3-319-16715-2_23"},{"key":"32_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-89255-7_20","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Hisil","year":"2008","unstructured":"Hisil, H., Wong, K.K., Carter, G., Dawson, E.: Twisted Edwards curves revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 326\u2013343. Springer, Heidelberg (2008). doi:\n                      10.1007\/978-3-540-89255-7_20"},{"key":"32_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/3-540-36288-6_17","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"T Izu","year":"2003","unstructured":"Izu, T., Takagi, T.: Exceptional procedure attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 224\u2013239. Springer, Heidelberg (2003). doi:\n                      10.1007\/3-540-36288-6_17"},{"key":"32_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/3-540-44709-1_31","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"M Joye","year":"2001","unstructured":"Joye, M., Tymen, C.: Protections against differential analysis for elliptic curve cryptography \u2014 an algebraic approach \u2014. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 377\u2013390. Springer, Heidelberg (2001). doi:\n                      10.1007\/3-540-44709-1_31"},{"key":"32_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M Joye","year":"2003","unstructured":"Joye, M., Yen, S.-M.: The montgomery powering ladder. In: Kaliski, B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 291\u2013302. Springer, Heidelberg (2003). doi:\n                      10.1007\/3-540-36400-5_22"},{"key":"32_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). doi:\n                      10.1007\/3-540-48405-1_25"},{"key":"32_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO 1996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). doi:\n                      10.1007\/3-540-68697-5_9"},{"key":"32_CR34","unstructured":"Ladd, W., Longa, P., Barnes, R.: Curve4Q. Internet-Draft, draft-ladd-cfrg-4q-01 (2016\u20132017). \n                      https:\/\/www.ietf.org\/id\/draft-ladd-cfrg-4q-01.txt"},{"key":"32_CR35","unstructured":"Liu, Z., Longa, P., Pereira, G., Reparaz, O., Seo, H.: Four$$\\mathbb{Q}$$ on embedded devices with strong countermeasures against side-channel attacks. IACR Cryptology ePrint Archive, Report 2017\/434 (2017). \n                      http:\/\/eprint.iacr.org\/2017\/434"},{"key":"32_CR36","doi-asserted-by":"crossref","unstructured":"Longa, P.: Four$$\\mathbb{Q}$$NEON: faster elliptic curve scalar multiplications on ARM processors. In: Avanzi, R., Heys, H. (eds.) Selected Areas in Cryptography - SAC 2016. LNCS. Springer (2016, to appear). \n                      http:\/\/eprint.iacr.org\/2016\/645","DOI":"10.1007\/978-3-319-69453-5_27"},{"key":"32_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-28632-5_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"H Mamiya","year":"2004","unstructured":"Mamiya, H., Miyaji, A., Morimoto, H.: Efficient countermeasures against RPA, DPA, and SPA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 343\u2013356. Springer, Heidelberg (2004). doi:\n                      10.1007\/978-3-540-28632-5_25"},{"key":"32_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-29912-4_14","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"C Murdica","year":"2012","unstructured":"Murdica, C., Guilley, S., Danger, J., Hoogvorst, P., Naccache, D.: Same values power analysis using special points on elliptic curves. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 183\u2013198. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-29912-4_14"},{"key":"32_CR39","doi-asserted-by":"crossref","unstructured":"Nascimento, E., Chmielewski, L., Oswald, D., Schwabe, P.: Attacking embedded ECC implementations through cmov side channels. In: Selected Areas in Cryptology \u2013 SAC 2016. Springer (2016, to appear)","DOI":"10.1007\/978-3-319-69453-5_6"},{"key":"32_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-319-24126-5_17","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"E Nascimento","year":"2015","unstructured":"Nascimento, E., L\u00f3pez, J., Dahab, R.: Efficient and secure elliptic curve cryptography for 8-bit AVR microcontrollers. In: Chakraborty, R.S., Schwabe, P., Solworth, J. (eds.) SPACE 2015. LNCS, vol. 9354, pp. 289\u2013309. Springer, Cham (2015). doi:\n                      10.1007\/978-3-319-24126-5_17"},{"key":"32_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/3-540-44495-5_16","volume-title":"Progress in Cryptology \u2014INDOCRYPT 2000","author":"K Okeya","year":"2000","unstructured":"Okeya, K., Sakurai, K.: Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 178\u2013190. Springer, Heidelberg (2000). doi:\n                      10.1007\/3-540-44495-5_16"},{"key":"32_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11967668_16","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"E Oswald","year":"2006","unstructured":"Oswald, E., Mangard, S.: Template attacks on masking\u2014resistance is futile. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 243\u2013256. Springer, Heidelberg (2006). doi:\n                      10.1007\/11967668_16"},{"key":"32_CR43","unstructured":"Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel. Technical report CSTR-02-003, Department of Computer Science, University of Bristol (2002). \n                      http:\/\/www.cs.bris.ac.uk\/Publications\/Papers\/1000625.pdf"},{"key":"32_CR44","doi-asserted-by":"crossref","unstructured":"Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the Fourth ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 169\u2013176. ACM (2006)","DOI":"10.1145\/1180345.1180366"},{"key":"32_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-77535-5_17","volume-title":"Information Security Applications","author":"E Prouff","year":"2007","unstructured":"Prouff, E., Rivain, M.: A generic method for secure SBox implementation. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 227\u2013244. Springer, Heidelberg (2007). doi:\n                      10.1007\/978-3-540-77535-5_17"},{"key":"32_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-662-53140-2_15","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"J Renes","year":"2016","unstructured":"Renes, J., Schwabe, P., Smith, B., Batina, L.: $$\\mu $$Kummer: Efficient hyperelliptic signatures and key exchange on microcontrollers. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 301\u2013320. Springer, Heidelberg (2016). doi:\n                      10.1007\/978-3-662-53140-2_15"},{"key":"32_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-33027-8_10","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"O Reparaz","year":"2012","unstructured":"Reparaz, O., Gierlichs, B., Verbauwhede, I.: Selecting time samples for multivariate DPA attacks. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 155\u2013174. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-33027-8_10"},{"key":"32_CR48","unstructured":"Santis, F.D., Sigl, G.: Towards side-channel protected X25519 on ARM Cortex-M4 processors. Software Performance Enhancement for Encryption and Decryption, and Benchmarking (SPEED-B) (2016)"},{"key":"32_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-319-03515-4_15","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"H Seo","year":"2013","unstructured":"Seo, H., Liu, Z., Choi, J., Kim, H.: Multi-precision squaring for public-key cryptography on embedded microprocessors. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 227\u2013243. Springer, Cham (2013). doi:\n                      10.1007\/978-3-319-03515-4_15"},{"issue":"2","key":"32_CR50","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1049\/iet-ifs:20070017","volume":"2","author":"NP Smart","year":"2008","unstructured":"Smart, N.P., Oswald, E., Page, D.: Randomised representations. IET Inf. Secur. 2(2), 19\u201327 (2008)","journal-title":"IET Inf. Secur."},{"key":"32_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-17373-8_7","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"F-X Standaert","year":"2010","unstructured":"Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The world is not enough: another look on second-order DPA. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 112\u2013129. Springer, Heidelberg (2010). doi:\n                      10.1007\/978-3-642-17373-8_7"},{"key":"32_CR52","unstructured":"STMicroelectronics: STM32F4DISCOVERY: Discovery kit with STM32F407VG MCU, data brief (2016). \n                      http:\/\/www.st.com\/content\/ccc\/resource\/technical\/document\/data_brief\/09\/71\/8c\/4e\/e4\/da\/4b\/fa\/DM00037955.pdf\/files\/DM00037955.pdf\/jcr:content\/translations\/en.DM00037955.pdf"},{"key":"32_CR53","unstructured":"STMicroelectronics: Reference manual: STM32F405\/415, STM32F407\/417, STM32F427\/437 and STM32F429\/439 advanced ARM-based 32-bit MCUs (2017). \n                      http:\/\/www.st.com\/content\/ccc\/resource\/technical\/document\/reference_manual\/3d\/6d\/5a\/66\/b4\/99\/40\/d4\/DM00031020.pdf\/files\/DM00031020.pdf\/jcr:content\/translations\/en.DM00031020.pdf"},{"key":"32_CR54","unstructured":"Texas Instruments: User\u2019s guide: MSP430FR58xx, MSP430FR59xx, MSP430FR68xx, and MSP430FR69xx family (2012\u20132017). \n                      http:\/\/www.ti.com.cn\/cn\/lit\/ug\/slau367m\/slau367m.pdf"},{"key":"32_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-319-03515-4_16","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"E Wenger","year":"2013","unstructured":"Wenger, E., Unterluggauer, T., Werner, M.: 8\/16\/32 shades of elliptic curve cryptography on embedded processors. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 244\u2013261. Springer, Cham (2013). doi:\n                      10.1007\/978-3-319-03515-4_16"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2017"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66787-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:09:54Z","timestamp":1600387794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66787-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319667867","9783319667874"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66787-4_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"25 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CHES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptographic Hardware and Embedded Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ches2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ches.iacr.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}