{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:47:59Z","timestamp":1761662879488},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540408338"},{"type":"electronic","value":"9783540452386"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45238-6_30","type":"book-chapter","created":{"date-parts":[[2010,6,24]],"date-time":"2010-06-24T00:04:43Z","timestamp":1277337883000},"page":"382-396","source":"Crossref","is-referenced-by-count":34,"title":["A Practical Countermeasure against Address-Bit Differential Power Analysis"],"prefix":"10.1007","author":[{"given":"Kouichi","family":"Itoh","sequence":"first","affiliation":[]},{"given":"Tetsuya","family":"Izu","sequence":"additional","affiliation":[]},{"given":"Masahiko","family":"Takenaka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/3-540-44448-3_38","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Akkar","year":"2000","unstructured":"Akkar, M., Dischamp, P., Moyart, D.: Power Analysis, What is Now Possible.. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 489\u2013502. Springer, Heidelberg (2000)"},{"key":"30_CR2","unstructured":"Billet, O., Joye, M.: The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. In: Cryptology ePrint Archive, 2002\/125 (2002), Available from \n                    \n                      http:\/\/eprint.iacr.org\/2002\/125\/"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Public Key Cryptography","author":"E. Brier","year":"2002","unstructured":"Brier, E., Joye, M.: Weierstra\u00df Elliptic Curves and Side-Channel Attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 335\u2013345. Springer, Heidelberg (2002)"},{"key":"30_CR4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I. Blake","year":"1999","unstructured":"Blake, I., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J. Coron","year":"1999","unstructured":"Coron, J.: Resistance against differential power analysis for elliptic curve cryptosystem. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/3-540-44709-1_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"C. Clavier","year":"2001","unstructured":"Clavier, C., Joye, M.: Universal exponentiation algorithm \u2013 A first step towards provable SPA-resistance \u2013. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 300\u2013308. Springer, Heidelberg (2001)"},{"key":"30_CR7","unstructured":"Fischer, W., Giraud, C., Knudsen, E., Seifert, J.: Parallel Scalar Multiplication on General Elliptic Curves over Fp Hedged Against Non-Differential Side- Channel Attacks. Cryptology ePrint Archive, 2002\/007 (2002), Available from \n                    \n                      http:\/\/eprint.iacr.org\/2002\/007\/"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D. Gordon","year":"1998","unstructured":"Gordon, D.: A Survey of fast exponentiation methods. J. Algorithms\u00a027, 129\u2013146 (1998)","journal-title":"J. Algorithms"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Hasan, M.: Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Curve Crypto-systems. IEEE Trans. Computers, 1071\u20131083 (October 2001)","DOI":"10.1109\/12.956092"},{"key":"30_CR10","unstructured":"IEEE P1363, Standard Specifications for Public-Key Cryptography (2000)"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-36400-5_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"K. Itoh","year":"2003","unstructured":"Itoh, K., Izu, T., Takenaka, M.: Address-bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 129\u2013143. Springer, Heidelberg (2003)"},{"key":"30_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/3-540-36231-2_24","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"T. Izu","year":"2002","unstructured":"Izu, T., M\u00f6ller, B., Takagi, T.: Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 296\u2013313. Springer, Heidelberg (2002)"},{"key":"30_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/3-540-45664-3_20","volume-title":"Public Key Cryptography","author":"T. Izu","year":"2002","unstructured":"Izu, T., Takagi, T.: A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 280\u2013296. Springer, Heidelberg (2002)"},{"key":"30_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/3-540-36288-6_17","volume-title":"Public Key Cryptography - PKC 2003","author":"T. Izu","year":"2002","unstructured":"Izu, T., Takagi, T.: Exceptional Procedure Attack on Elliptic Curve Cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 224\u2013239. Springer, Heidelberg (2002)"},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-36400-5_23","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"K. Itoh","year":"2003","unstructured":"Itoh, K., Yajima, J., Takenaka, M., Torii, N.: DPA Countermeasures by Improving the Window Method. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 303\u2013317. Springer, Heidelberg (2003)"},{"key":"30_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/3-540-44709-1_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"M. Joye","year":"2001","unstructured":"Joye, M., Tymen, C.: Protections against Differential Analysis for Elliptic Curve Cryptography. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 377\u2013390. Springer, Heidelberg (2001)"},{"key":"30_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-44709-1_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"M. Joye","year":"2001","unstructured":"Joye, M., Quisquater, J.: Hessian Elliptic Curves and Side-Channel Attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 402\u2013410. Springer, Heidelberg (2001)"},{"key":"30_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M. Joye","year":"2003","unstructured":"Joye, M., Yen, S.-M.: The Montgomery Powering Ladder. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 291\u2013302. Springer, Heidelberg (2003)"},{"key":"30_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"C. Kocher","year":"1996","unstructured":"Kocher, C.: Timing attacks on Implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"30_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"C. Kocher","year":"1999","unstructured":"Kocher, C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"30_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/3-540-44709-1_32","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"P. Liardet","year":"2001","unstructured":"Liardet, P., Smart, N.: Preventing SPA\/DPA in ECC Systems Using the Jacobi From. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 391\u2013401. Springer, Heidelberg (2001)"},{"key":"30_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45439-X_22","volume-title":"Information Security","author":"B. M\u00f6ller","year":"2001","unstructured":"M\u00f6ller, B.: Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 324\u2013334. Springer, Heidelberg (2001)"},{"key":"30_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-45811-5_31","volume-title":"Information Security","author":"B. M\u00f6ller","year":"2002","unstructured":"M\u00f6ller, B.: Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433, pp. 402\u2013413. Springer, Heidelberg (2002)"},{"key":"30_CR24","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P. Montgomery","year":"1987","unstructured":"Montgomery, P.: Speeding the Pollard and elliptic curve methods for factorizations. Math. of Comp.\u00a048, 243\u2013264 (1987)","journal-title":"Math. of Comp."},{"key":"30_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems","author":"T. Messerges","year":"1999","unstructured":"Messerges, T., Dabbish, E., Sloan, R.: Power Analysis Attacks of Modular Exponentiation in Smartcards. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 144\u2013157. Springer, Heidelberg (1999)"},{"key":"30_CR26","unstructured":"Messerges, T., Dabbish, E., Sloan, R.: Investigations of Power Analysis Attacks on Smartcards. In: USENIX Workshop on Smartcard Technology (1999) (preprint)"},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"May, D., Muller, H.L., Smart, N.P.: Random Register Renaming to Foil DPA. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 28\u201338. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44709-1_4"},{"key":"30_CR28","unstructured":"National Institute of Standards and Technology, Recommended Elliptic Curves for Federal Government Use, in the appendix of FIPS 186-2"},{"key":"30_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-36400-5_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"E. Oswald","year":"2003","unstructured":"Oswald, E.: Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 82\u201397. Springer, Heidelberg (2003)"},{"key":"30_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44709-1_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"E. Oswald","year":"2001","unstructured":"Oswald, E., Aigner, M.: Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 39\u201350. Springer, Heidelberg (2001)"},{"key":"30_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-540-46588-1_17","volume-title":"Public Key Cryptography","author":"K. Okeya","year":"2000","unstructured":"Okeya, K., Kurumatani, H., Sakurai, K.: Elliptic curves with the Montgomery form and their cryptographic applications. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 446\u2013465. Springer, Heidelberg (2000)"},{"key":"30_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/3-540-44495-5_16","volume-title":"Progress in Cryptology - INDOCRYPT 2000","author":"K. Okeya","year":"2000","unstructured":"Okeya, K., Sakurai, K.: Power analysis breaks elliptic curve cryptosystem even secure against the timing attack. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol.\u00a01977, pp. 178\u2013190. Springer, Heidelberg (2000)"},{"key":"30_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/3-540-45450-0_32","volume-title":"Information Security and Privacy","author":"K. Okeya","year":"2002","unstructured":"Okeya, K., Sakurai, K.: On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 420\u2013435. Springer, Heidelberg (2002)"},{"key":"30_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-45811-5_30","volume-title":"Information Security","author":"K. Okeya","year":"2002","unstructured":"Okeya, K., Sakurai, K.: A Second-Order DPA Attack Breaks a Windowmethod based Countermeasure against Side Channel Attacks. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433, pp. 389\u2013401. Springer, Heidelberg (2002)"},{"key":"30_CR35","unstructured":"Okeya, K., Sakurai, K.: A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks. To appear in the proceedings of 2003 IEEE Information Theory Workshop (2003)"},{"key":"30_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-44709-1_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"N. Smart","year":"2001","unstructured":"Smart, N.: The Hessian Form of an Elliptic Curve. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 118\u2013125. Springer, Heidelberg (2001)"},{"key":"30_CR37","unstructured":"Standards for Efficient Cryptography Group (SECG), Specification of Standards for Efficient Cryptography"},{"key":"30_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45760-7_5","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"C.D. Walter","year":"2002","unstructured":"Walter, C.D.: MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 53\u201366. Springer, Heidelberg (2002)"},{"key":"30_CR39","unstructured":"Walter, C.: Security Constraints on the Oswald-Aigner Exponentiation Algorithm, Cryptology ePrint Archive, Report 2003\/013 (2003), Available from \n                    \n                      http:\/\/eprint.iacr.org\/2003\/013\/"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45238-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T10:45:58Z","timestamp":1558435558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45238-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408338","9783540452386"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45238-6_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}