{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:26:53Z","timestamp":1774600013043,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642144226","type":"print"},{"value":"9783642144233","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14423-3_13","type":"book-chapter","created":{"date-parts":[[2010,6,18]],"date-time":"2010-06-18T12:13:34Z","timestamp":1276863214000},"page":"176-192","source":"Crossref","is-referenced-by-count":20,"title":["Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications"],"prefix":"10.1007","author":[{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"first","affiliation":[]},{"given":"Elisabeth","family":"Oswald","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Page","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Tunstall","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1314466.1314469","volume-title":"Proceedings of the 1st ACM Workshop on Computer Security Architecture (CSAW 2007)","author":"O. Ac\u0131i\u00e7mez","year":"2007","unstructured":"Ac\u0131i\u00e7mez, O.: Yet another microarchitectural attack: Exploiting I-cache. In: Proceedings of the 1st ACM Workshop on Computer Security Architecture (CSAW 2007), pp. 11\u201318. ACM Press, New York (2007)"},{"key":"13_CR2","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1229285.1266999","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007)","author":"O. Ac\u0131i\u00e7mez","year":"2007","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K., Seifert, J.-P.: On the power of simple branch prediction analysis. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pp. 312\u2013320. ACM Press, New York (2007)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/11967668_15","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"O. Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K., Seifert, J.-P.: Predicting secret keys via branch prediction. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 225\u2013242. Springer, Heidelberg (2006)"},{"issue":"4","key":"13_CR4","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MSP.2007.91","volume":"5","author":"O. Ac\u0131i\u00e7mez","year":"2007","unstructured":"Ac\u0131i\u00e7mez, O., Seifert, J.-P., Ko\u00e7, \u00c7.K.: Micro-architectural cryptanalysis. IEEE Security & Privacy\u00a05(4), 62\u201364 (2007)","journal-title":"IEEE Security & Privacy"},{"key":"13_CR5","unstructured":"ARM Limited. ARM7TDMI Technical Reference Manual (Revision r4p1). ARM Doc No. DDI\u00a00210, Issue\u00a0C (November 2004)"},{"key":"13_CR6","unstructured":"ARM Limited. ARM Architecture Reference Manual. ARM Doc No. DDI\u00a00100, Issue\u00a0I (July 2005)"},{"key":"13_CR7","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES. Preprint (2005), \n                      http:\/\/cr.yp.to\/papers.html#cachetiming"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-36400-5_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Fragneto, P., Macchetti, M., Marchesin, S.: Efficient software implementation of AES on 32-bit platforms. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 159\u2013171. Springer, Heidelberg (2003)"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/ITCC.2005.62","volume-title":"Proceedings of the 6th International Conference on Information Technology: Coding and Computing (ITCC\u00a02005)","author":"G. Bertoni","year":"2005","unstructured":"Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M., Palermo, G.: AES power attack based on induced cache miss and countermeasure. In: Proceedings of the 6th International Conference on Information Technology: Coding and Computing (ITCC\u00a02005), vol.\u00a01, pp. 586\u2013591. IEEE Computer Society Press, Los Alamitos (2005)"},{"issue":"2","key":"13_CR10","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1093\/qjmam\/4.2.236","volume":"4","author":"A.D. Booth","year":"1951","unstructured":"Booth, A.D.: A signed binary multiplication technique. Quarterly Journal of Mechanics and Applied Mathematics\u00a04(2), 236\u2013240 (1951)","journal-title":"Quarterly Journal of Mechanics and Applied Mathematics"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Public Key Cryptography","author":"E. Brier","year":"2002","unstructured":"Brier, E., Joye, M.: Weierstra\u00df elliptic curves and side-channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 335\u2013345. Springer, Heidelberg (2002)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"issue":"5","key":"13_CR13","first-page":"349","volume":"34","author":"L. Dadda","year":"1965","unstructured":"Dadda, L.: Some schemes for parallel multipliers. Alta Frequenza\u00a034(5), 349\u2013356 (1965)","journal-title":"Alta Frequenza"},{"key":"13_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES \u2013 The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES \u2013 The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"13_CR15","volume-title":"ARM System-on-Chip Architecture","author":"S.B. Furber","year":"2000","unstructured":"Furber, S.B.: ARM System-on-Chip Architecture, 2nd edn. Addison-Wesley, Reading (2000)","edition":"2"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-36400-5_10","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"C.H. Gebotys","year":"2003","unstructured":"Gebotys, C.H., Gebotys, R.J.: Secure elliptic curve implementations: An analysis of resistance to power-attacks in a DSP processor. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 114\u2013128. Springer, Heidelberg (2003)"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36288-6_15","volume-title":"Public Key Cryptography - PKC 2003","author":"L. Goubin","year":"2002","unstructured":"Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 199\u2013210. Springer, Heidelberg (2002)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Gro\u00dfsch\u00e4dl, J., Oswald, E., Page, D., Tunstall, M.: Side-channel analysis of cryptographic software via early-terminating multiplications. Cryptology ePrint Archive, Report 2009\/538 (2009), \n                      http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-14423-3_13"},{"key":"13_CR19","volume-title":"Guide to Elliptic Curve Cryptography","author":"D.R. Hankerson","year":"2004","unstructured":"Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"issue":"6","key":"13_CR20","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/31.55029","volume":"37","author":"R. Hartley","year":"1990","unstructured":"Hartley, R., Corbett, P.: Digit-serial processing techniques. IEEE Transactions on Circuits and Systems\u00a037(6), 707\u2013719 (1990)","journal-title":"IEEE Transactions on Circuits and Systems"},{"key":"13_CR21","unstructured":"IBM Corporation: PowerPC 440x6 Embedded Processor Core User\u2019s Manual (Version 07) (July 2008), \n                      http:\/\/www.ibm.com\/chips\/techlib\/techlib.nsf\/products\/PowerPC_440_Embedded_Core"},{"key":"13_CR22","unstructured":"Intel Corporation. Intel\u00ae StrongARM\u00ae SA-1100 Microprocessor for Embedded Applications. Brief datasheet, order number 278092-005 (June 1999)"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-642-02384-2_21","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"M. Joye","year":"2009","unstructured":"Joye, M., Tunstall, M.: Exponent recoding and regular exponentiation algorithms. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 334\u2013349. Springer, Heidelberg (2009)"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"13_CR25","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1145\/996566.996771","volume-title":"Proceedings of the 41st Design Automation Conference (DAC 2004)","author":"P.C. Kocher","year":"2004","unstructured":"Kocher, P.C., Lee, R.B., McGraw, G.E., Raghunathan, A., Ravi, S.: Security as a new dimension in embedded system design. In: Proceedings of the 41st Design Automation Conference (DAC 2004), pp. 753\u2013760. ACM Press, New York (2004)"},{"key":"13_CR26","unstructured":"MIPS Technologies, Inc. MIPS32 4KmTM Processor Core Datasheet (November 2004), \n                      http:\/\/www.mips.com\/products\/processors\/32-64-bit-cores\/mips32-m4k\/"},{"key":"13_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45439-X_22","volume-title":"Information Security","author":"B. M\u00f6ller","year":"2001","unstructured":"M\u00f6ller, B.: Securing elliptic curve point multiplication against side-channel attacks. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 324\u2013334. Springer, Heidelberg (2001)"},{"issue":"170","key":"13_CR28","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Mathematics of Computation\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"13_CR29","unstructured":"National Institute of Standards and Technology (NIST). Digital Signature Standard (DSS). FIPS Publication 186-2 (February 2000)"},{"key":"13_CR30","unstructured":"National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES). FIPS Publication 197 (November 2001)"},{"key":"13_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"D.A. Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: The case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"13_CR32","unstructured":"Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel. Technical Report CSTR-02-003, Department of Computer Science, University of Bristol, Bristol, U.K. (June 2002)"},{"issue":"3","key":"13_CR33","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/1015047.1015049","volume":"3","author":"S. Ravi","year":"2004","unstructured":"Ravi, S., Raghunathan, A., Kocher, P.C., Hattangady, S.: Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems\u00a03(3), 461\u2013491 (2004)","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"13_CR34","unstructured":"Rivest, R.L., Robshaw, M.J., Sidney, R., Yin, Y.L.: The RC6TM block cipher. Technical report, RSA Laboratories, Bedford, MA, USA (August 1998), \n                      ftp:\/\/ftp.rsasecurity.com\/pub\/rsalabs\/rc6\/rc6v11.pdf"},{"issue":"2","key":"13_CR35","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"13_CR36","unstructured":"RSA Security, Inc. PKCS #1 v2.1: RSA Cryptography Standard (June 2002), \n                      ftp:\/\/ftp.rsasecurity.com\/pub\/pkcs\/pkcs-1\/pkcs-1v2-1.pdf"},{"key":"13_CR37","unstructured":"Standards for Efficient Cryptography Group (SECG). SEC\u00a01: Elliptic Curve Cryptography (September 2000), \n                      http:\/\/www.secg.org\/download\/aid-385\/sec1_final.pdf"}],"container-title":["Lecture Notes in Computer Science","Information, Security and Cryptology \u2013 ICISC 2009"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14423-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T10:54:27Z","timestamp":1674816867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-14423-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642144226","9783642144233"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14423-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}