{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:10:12Z","timestamp":1725570612739},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176180"},{"type":"electronic","value":"9783642176197"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17619-7_5","type":"book-chapter","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T11:45:07Z","timestamp":1291117507000},"page":"44-61","source":"Crossref","is-referenced-by-count":4,"title":["Performance and Security Aspects of Client-Side SSL\/TLS Processing on Mobile Devices"],"prefix":"10.1007","author":[{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"first","affiliation":[]},{"given":"Ilya","family":"Kizhvatov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Atasu, K., Breveglieri, L., Macchetti, M.: Efficient AES implementations for ARM based platforms. In: Proceedings of the 19th ACM Symposium on Applied Computing (SAC 2004), pp. 841\u2013845. ACM Press, New York (2004)","DOI":"10.1145\/967900.968073"},{"key":"5_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I.F. Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., M\u00f6ller, B.: Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). Internet Engineering Task Force, Network Working Group, RFC 4492 (May 2006)","DOI":"10.17487\/rfc4492"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-89754-5_20","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"A. Bogdanov","year":"2008","unstructured":"Bogdanov, A., Kizhvatov, I., Pyshkin, A.: Algebraic methods in side-channel collision attacks and practical collision detection. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 251\u2013265. Springer, Heidelberg (2008)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"C. Clavier","year":"2000","unstructured":"Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 252\u2013263. Springer, Heidelberg (2000)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.K.: The transport layer security (TLS) protocol version 1.2. Internet Engineering Task Force, Network Working Group, RFC 5246 (August 2008)","DOI":"10.17487\/rfc5246"},{"key":"5_CR7","unstructured":"Dworkin, M.: Recommendation for block cipher modes of operation: Galois\/Counter mode and GMAC. NIST Special Publication 800-38D (November 2007), http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-38D\/SP-800-38D.pdf"},{"key":"5_CR8","unstructured":"Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol Version 3.0. Internet Draft (November 1996), http:\/\/wp.netscape.com\/eng\/ssl3\/draft302.txt"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/11545262_19","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"C.H. Gebotys","year":"2005","unstructured":"Gebotys, C.H., Ho, S.C., Tiu, C.C.: EM analysis of Rijndael and ECC on a wireless Java-based PDA. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 250\u2013264. Springer, Heidelberg (2005)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Mennink, B.: Towards side-channel resistant block cipher usage or can we encrypt without side-channel countermeasures? Cryptology ePrint Archive, Report 2010\/015 (2010), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-18178-8_22"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/570681.570691","volume-title":"Proceedings of the 3rd ACM Workshop on Wireless Security (WiSe 2002)","author":"V. Gupta","year":"2002","unstructured":"Gupta, V., Gupta, S., Chang Shantz, S., Stebila, D.: Performance analysis of elliptic curve cryptography for SSL. In: Proceedings of the 3rd ACM Workshop on Wireless Security (WiSe 2002), pp. 87\u201394. ACM Press, New York (2002)"},{"key":"5_CR12","first-page":"231","volume-title":"Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS 2004)","author":"V. Gupta","year":"2004","unstructured":"Gupta, V., Stebila, D., Fung, S., Chang Shantz, S., Gura, N., Eberle, H.: Speeding up secure Web transactions using elliptic curve cryptography. In: Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS 2004), pp. 231\u2013239. Internet Society, San Diego (2004)"},{"key":"5_CR13","volume-title":"Guide to Elliptic Curve Cryptography","author":"D.R. Hankerson","year":"2004","unstructured":"Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-10838-9_12","volume-title":"Information Security Applications","author":"N. Hanley","year":"2009","unstructured":"Hanley, N., Tunstall, M., Marnane, W.P.: Unknown plaintext template attacks. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol.\u00a05932, pp. 148\u2013162. Springer, Heidelberg (2009)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/11767480_16","volume-title":"Applied Cryptography and Network Security","author":"C. Herbst","year":"2006","unstructured":"Herbst, C., Oswald, E., Mangard, S.: An AES smart card implementation resistant to power analysis attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 239\u2013252. Springer, Heidelberg (2006)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-74735-2_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Jaffe","year":"2007","unstructured":"Jaffe, J.: A first-order DPA attack against AES in counter mode with unknown initial counter. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 1\u201313. Springer, Heidelberg (2007)"},{"issue":"7","key":"5_CR17","first-page":"595","volume":"7","author":"A.A. Karatsuba","year":"1963","unstructured":"Karatsuba, A.A., Ofman, Y.P.: Multiplication of multidigit numbers on automata. Soviet Physics - Doklady\u00a07(7), 595\u2013596 (1963)","journal-title":"Soviet Physics - Doklady"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04138-9_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"E. K\u00e4sper","year":"2009","unstructured":"K\u00e4sper, E., Schwabe, P.: Faster and timing-attack resistant AES-GCM. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 1\u201317. Springer, Heidelberg (2009)"},{"key":"5_CR19","volume-title":"Network Security: Private Communication in a Public World","author":"C. Kaufman","year":"2002","unstructured":"Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World. Prentice Hall, Englewood Cliffs (2002)"},{"key":"5_CR20","series-title":"The Art of Computer Programming","volume-title":"Seminumerical Algorithms","author":"D.E. Knuth","year":"1998","unstructured":"Knuth, D.E.: Seminumerical Algorithms, 3rd edn. The Art of Computer Programming, vol.\u00a02. Addison-Wesley, Reading (1998)","edition":"3"},{"issue":"3","key":"5_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/40.502403","volume":"16","author":"\u00c7.K. Ko\u00e7","year":"1996","unstructured":"Ko\u00e7, \u00c7.K., Acar, T., Kaliski, B.S.: Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro.\u00a016(3), 26\u201333 (1996)","journal-title":"IEEE Micro."},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-540-89641-8_25","volume-title":"Cryptology and Network Security","author":"M. Koschuch","year":"2008","unstructured":"Koschuch, M., Gro\u00dfsch\u00e4dl, J., Payer, U., Hudler, M., Kr\u00fcger, M.: Workload characterization of a lightweight SSL implementation resistant to side-channel attacks. In: Franklin, M.K., Hui, L.C., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 349\u2013365. Springer, Heidelberg (2008)"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-540-24660-2_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"S. Mangard","year":"2004","unstructured":"Mangard, S.: Hardware countermeasures against DPA \u2013 A statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 222\u2013235. Springer, Heidelberg (2004)"},{"key":"5_CR25","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"issue":"14","key":"5_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v008.i14","volume":"8","author":"G. Marsaglia","year":"2003","unstructured":"Marsaglia, G.: Xorshift RNGs. Journal of Statistical Software\u00a08(14), 1\u20136 (2003)","journal-title":"Journal of Statistical Software"},{"key":"5_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-77535-5_23","volume-title":"Information Security Applications","author":"R. McEvoy","year":"2007","unstructured":"McEvoy, R., Tunstall, M., Murphy, C.C., Marnane, W.P.: Differential power analysis of HMAC based on SHA-2, and countermeasures. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.\u00a04867, pp. 317\u2013332. Springer, Heidelberg (2007)"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-30556-9_27","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"D.A. McGrew","year":"2004","unstructured":"McGrew, D.A., Viega, J.: The security and performance of the Galois\/Counter Mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 343\u2013355. Springer, Heidelberg (2004)"},{"key":"5_CR29","first-page":"977","volume-title":"Proceedings of the 13th Conference on Design, Automation and Test in Europe (DATE 2010)","author":"O. Meynard","year":"2010","unstructured":"Meynard, O., Guilley, S., Danger, J.-L., Sauvage, L.: Far correlation-based EMA with a precharacterized leakage model. In: Proceedings of the 13th Conference on Design, Automation and Test in Europe (DATE 2010), pp. 977\u2013980. IEEE Computer Society Press, Los Alamitos (2010)"},{"key":"5_CR30","unstructured":"Mills, E.: Leaking crypto keys from mobile devices. CNET News (October 2009), http:\/\/news.cnet.com\/8301-27080_3-10379115-245.html"},{"key":"5_CR31","unstructured":"Modadugu, N., Rescorla, E.K.: AES Counter Mode Cipher Suites for TLS and DTLS. Internet draft (June 2006), http:\/\/tools.ietf.org\/pdf\/draft-ietf-tls-ctr-01.pdf"},{"key":"5_CR32","unstructured":"National Institute of Standards and Technology (NIST). Recommendation for Key Management \u2013 Part\u00a01: General (Revised). Special Publication 800-57 (March 2007), http:\/\/csrc.nist.gov\/publications\/PubsSPs.html"},{"key":"5_CR33","unstructured":"OpenSSL Project. OpenSSL 0.9.7k (September 2006), http:\/\/www.openssl.org"},{"key":"5_CR34","unstructured":"PeerSec Networks, Inc. MatrixSSL 1.7.1 (September 2005), http:\/\/www.matrixssl.org"},{"key":"5_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-04138-9_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"M. Rivain","year":"2009","unstructured":"Rivain, M., Prouff, E., Doget, J.: Higher-order masking and shuffling for software implementations of block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 171\u2013188. Springer, Heidelberg (2009)"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Salowey, J.A., Choudhury, A.K., McGrew, D.A.: AES Galois Counter Mode (GCM) Cipher Suites for TLS. Internet Engineering Task Force, Network Working Group, RFC 5288 (August 2008)","DOI":"10.17487\/rfc5288"},{"key":"5_CR37","volume-title":"SSL and TLS Essentials: Securing the Web","author":"S.A. Thomas","year":"2000","unstructured":"Thomas, S.A.: SSL and TLS Essentials: Securing the Web. John Wiley & Sons, Inc., Chichester (2000)"},{"key":"5_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-540-85053-3_15","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"S. Tillich","year":"2008","unstructured":"Tillich, S., Herbst, C.: Attacking state-of-the-art software countermeasures \u2013 A case study for AES. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 228\u2013243. Springer, Heidelberg (2008)"},{"key":"5_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-72738-5_10","volume-title":"Applied Cryptography and Network Security","author":"S. Tillich","year":"2007","unstructured":"Tillich, S., Herbst, C., Mangard, S.: Protecting AES software implementations on 32-bit platforms against power analysis. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 141\u2013157. Springer, Heidelberg (2007)"},{"key":"5_CR40","first-page":"769","volume-title":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (MELECON 2004)","author":"R. Tirtea","year":"2004","unstructured":"Tirtea, R., Deconinck, G.: Specifications overview for counter mode of operation. Security aspects in case of faults. In: Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (MELECON 2004), vol.\u00a02, pp. 769\u2013773. IEEE, Los Alamitos (2004)"},{"key":"5_CR41","unstructured":"VeriSign, Inc. Secure Wireless E-Commerce with PKI from VeriSign. White paper (January 2000), https:\/\/www.verisign.com\/server\/rsc\/wp\/wap\/index.html"},{"key":"5_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-44706-7_3","volume-title":"Fast Software Encryption","author":"M. Zhang","year":"2000","unstructured":"Zhang, M., Carroll, C., Chan, A.: The software-oriented stream cipher SSC2. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 31\u201348. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17619-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T17:34:03Z","timestamp":1559842443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17619-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176180","9783642176197"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17619-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}