{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:55:53Z","timestamp":1761580553921},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773597"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77360-3_8","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T03:04:18Z","timestamp":1196478258000},"page":"110-125","source":"Crossref","is-referenced-by-count":48,"title":["Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms"],"prefix":"10.1007","author":[{"given":"Frederic","family":"Amiel","sequence":"first","affiliation":[]},{"given":"Benoit","family":"Feix","sequence":"additional","affiliation":[]},{"given":"Karine","family":"Villegas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Avanzi, R.-M., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Verkauteren, F.: Handbook of elliptic and hyperelliptic curve cryptography (2006)"},{"key":"8_CR2","unstructured":"Akkar, M.-L.: Attaques et m\u00e9thodes de protections de protections de syst\u00e8mes de cryptographie embarqu\u00e9e. PhD thesis, Universit\u00e9 de Versailles (2004)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/3-540-36400-5_18","volume-title":"CHES 2002","author":"B. Boer den","year":"2003","unstructured":"den Boer, B., Lemke, K., Wicke, G.: A DPA attack against the modular reduction within a CRT implementation of RSA. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 228\u2013243. Springer, Heidelberg (2003)"},{"key":"8_CR5","unstructured":"Clavier, C.: Side channel analysis for reverse engineering (SCARE), an improved attack against a secret A3\/A8 GSM algorithm. IACR Cryptology eprint archive (049) (2004)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"issue":"6","key":"8_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"8_CR8","unstructured":"Dhem, J.-F.: Design of an efficient public-key cryptographic library for RISC-based smart cards. PhD thesis, Universit\u00e9 catholique de Louvain, Louvain (1998)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/11496137_27","volume-title":"Applied Cryptography and Network Security","author":"R. Daudigny","year":"2005","unstructured":"Daudigny, R., Ledig, H., Muller, F., Valette, F.: Scare of the DES. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 393\u2013406. Springer, Heidelberg (2005)"},{"key":"8_CR10","first-page":"115","volume-title":"CARDIS","author":"M. Joye","year":"2004","unstructured":"Joye, M.: Smart-card implementation of elliptic curve cryptography and DPA-type attacks. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., El Kalam, A.A. (eds.) CARDIS, pp. 115\u2013126. Kluwer, Dordrecht (2004)"},{"key":"8_CR11","unstructured":"Joye, M., Villegas, K.: A protected division algorithm. In: CARDIS 2002. Proceedings of the Fifth Smart Card Research and Advanced Application Conference (2002)"},{"issue":"3","key":"8_CR12","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/40.502403","volume":"16","author":"\u00c7.K.. Ko\u00e7","year":"1996","unstructured":"Ko\u00e7, \u00c7.K., Acar, T., Kaliski, B.-S.: Analysing and comparing Montgomery multiplication algorithms. IEEE Micro\u00a016(3), 26\u201333 (1996)","journal-title":"IEEE Micro"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"CRYPTO 1999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"177","key":"8_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. of Comp.\u00a048(177), 203\u2013209 (1987)","journal-title":"Math. of Comp."},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"CRYPTO 1996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems","author":"T.S. Messerges","year":"1999","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 144\u2013157. Springer, Heidelberg (1999)"},{"key":"8_CR17","unstructured":"Messerges, T.S.: Power analysis attacks and countermeasures for cryptographic algorithms. PhD thesis, University of Illinois at Chicago (2000)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/BFb0026949","volume-title":"CRYPTO 1986","author":"V.S. Miller","year":"1987","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 489\u2013502. Springer, Heidelberg (1987)"},{"issue":"170","key":"8_CR19","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Mathematics of Computation\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"8_CR20","unstructured":"NIST. Digital signature standard (DSS). Federal Information Processing Standards Publication 186-2 (January 2000)"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-540-45203-4_24","volume-title":"Applied Cryptography and Network Security","author":"R. Novak","year":"2003","unstructured":"Novak, R.: Side-channel attack on substitution blocks. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 307\u2013318. Springer, Heidelberg (2003)"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/3-540-44709-1_24","volume-title":"CHES 2001","author":"C.D. Walter","year":"2001","unstructured":"Walter, C.D.: Sliding windows succumbs to big mac attack. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 286\u2013299. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77360-3_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:09:35Z","timestamp":1619507375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77360-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540773597"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77360-3_8","relation":{},"subject":[]}}