{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:35Z","timestamp":1740096035544,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642210396"},{"type":"electronic","value":"9783642210402"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21040-2_10","type":"book-chapter","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T05:11:43Z","timestamp":1307077903000},"page":"144-159","source":"Crossref","is-referenced-by-count":20,"title":["A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines"],"prefix":"10.1007","author":[{"given":"Michael","family":"Hutter","sequence":"first","affiliation":[]},{"given":"Martin","family":"Feldhofer","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Wolkerstorfer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/11964254_3","volume-title":"Security and Privacy in Ad-Hoc and Sensor Networks","author":"L. Batina","year":"2006","unstructured":"Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: Butty\u00e1n, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol.\u00a04357, pp. 6\u201317. Springer, Heidelberg (2006)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Ebeid, N., Lambert, R.: Securing the Elliptic Curve Montgomery Ladder Against Fault Attacks. In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009, Lausanne, Switzerland, pp. 46\u201350 (September 2009)","DOI":"10.1109\/FDTC.2009.35"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004), \n                    \n                      http:\/\/springerlink.metapress.com\/content\/26tmfjfcju58upb2\/fulltext.pdf\n                    \n                    \n                  , doi:10.1007\/b99451"},{"key":"10_CR5","volume-title":"Proceedings of 2007 IEEE International Symposium on Circuits and Systems","author":"F. F\u00fcrbass","year":"2007","unstructured":"F\u00fcrbass, F., Wolkerstorfer, J.: ECC Processor with Low Die Size for RFID Applications. In: Proceedings of 2007 IEEE International Symposium on Circuits and Systems. IEEE, Los Alamitos (2007)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","first-page":"91","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"G. Hachez","year":"2000","unstructured":"Hachez, G., Quisquater, J.-J.: Montgomery Exponentiation with no Final Subtractions: Improved Results. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 91\u2013100. Springer, Heidelberg (2000), \n                    \n                      http:\/\/www.springerlink.com\/content\/n2m6w6b0kg3elaxu\/"},{"key":"10_CR7","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/DSD.2006.40","volume-title":"Proceedings of the 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools (DSD 2006)","author":"P. H\u00e4m\u00e4l\u00e4inen","year":"2006","unstructured":"H\u00e4m\u00e4l\u00e4inen, P., Alho, T., H\u00e4nnik\u00e4inen, M., H\u00e4m\u00e4l\u00e4inen, T.D.: Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools (DSD 2006), Dubrovnik, Croatia, August 30-September 1, pp. 577\u2013583. IEEE Computer Society, Los Alamitos (2006)"},{"key":"10_CR8","first-page":"332","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography, p. 332. Springer, Heidelberg (2004)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-642-04159-4_26","volume-title":"Selected Areas in Cryptography","author":"D. Hein","year":"2009","unstructured":"Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID \u2013 A Proof in Silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol.\u00a05381, pp. 401\u2013413. Springer, Heidelberg (2009)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-642-16822-2_16","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"M. Hutter","year":"2010","unstructured":"Hutter, M., Feldhofer, M., Plos, T.: An ECDSA Processor for RFID Authentication. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 189\u2013202. Springer, Heidelberg (2010)"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/3-540-36231-2_24","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"T. Izu","year":"2002","unstructured":"Izu, T., M\u00f6ller, B., Takagi, T.: Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 296\u2013313. Springer, Heidelberg (2002)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M. Joye","year":"2003","unstructured":"Joye, M., Yen, S.-M.: The Montgomery Powering Ladder. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 291\u2013302. Springer, Heidelberg (2003), \n                    \n                      http:\/\/www.springerlink.com\/content\/1eupwrx4c4xayyyv\/fulltext.pdf"},{"issue":"8","key":"10_CR13","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/12.403725","volume":"44","author":"B. Kaliski","year":"1995","unstructured":"Kaliski, B.: The Montgomery Inverse and its Applications. IEEE Transactions on Computers\u00a044(8), 1064\u20131065 (1995)","journal-title":"IEEE Transactions on Computers"},{"key":"10_CR14","unstructured":"Kaps, J.-P.: Cryptography for Ultra-Low Power Devices. PhD thesis, ECE Department, Worcester Polytechnic Institute, Worcester, Massachusetts, USA (May 2006)"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/11908739_25","volume-title":"Advances in Information and Computer Security","author":"M. Kim","year":"2006","unstructured":"Kim, M., Ryou, J., Choi, Y., Jun, S.: Low Power AES Hardware Architecture for Radio Frequency Identification. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol.\u00a04266, pp. 353\u2013363. Springer, Heidelberg (2006), \n                    \n                      http:\/\/www.springerlink.com\/content\/1pk7q6621xj2422r\/fulltext.pdf\n                    \n                    \n                  , doi:10.1007\/11908739"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"10_CR17","unstructured":"Kumar, S.S., Paar, C.: Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? In: Workshop on RFID Security 2006 (RFID Sec 2006), Graz, Austria, July 12-14 (2006)"},{"issue":"11","key":"10_CR18","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.1109\/TC.2008.148","volume":"57","author":"Y.K. Lee","year":"2008","unstructured":"Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic-Curve-Based Security Processor for RFID. IEEE Transactions on Computers\u00a057(11), 1514\u20131527 (2008), doi:10.1109\/TC.2008.148","journal-title":"IEEE Transactions on Computers"},{"key":"10_CR19","volume-title":"Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007) ISBN 978-0-387-30857-9"},{"key":"10_CR20","unstructured":"Meloni, N.: Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains. Cryptology ePrint Archive, Report 2006\/216 (2006)"},{"key":"10_CR21","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (November 2001), \n                    \n                      http:\/\/www.itl.nist.gov\/fipspubs\/"},{"key":"10_CR22","unstructured":"National Institute of Standards and Technology (NIST). FIPS-180-3: Secure Hash Standard (October 2008), \n                    \n                      http:\/\/www.itl.nist.gov\/fipspubs\/"},{"key":"10_CR23","unstructured":"National Institute of Standards and Technology (NIST). FIPS-186-3: Digital Signature Standard, DSS (2009), \n                    \n                      http:\/\/www.itl.nist.gov\/fipspubs\/"},{"issue":"4","key":"10_CR24","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TC.2003.1190586","volume":"52","author":"A. Satoh","year":"2003","unstructured":"Satoh, A., Takano, K.: A Scalable Dual-Field Elliptic Curve Cryptographic Processor. IEEE Transactions on Computers\u00a052(4), 449\u2013460 (2003), doi:10.1109\/TC.2003.1190586","journal-title":"IEEE Transactions on Computers"},{"key":"10_CR25","unstructured":"Solinas, J.A.: Generalized mersenne numbers. Technical Report CORR 99-39, Centre for Applied Cryptographic Research, University of Waterloo (1999)"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-17955-6_7","volume-title":"Information Security Applications","author":"E. Wenger","year":"2011","unstructured":"Wenger, E., Feldhofer, M., Felber, N.: Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol.\u00a06513, pp. 92\u2013106. Springer, Heidelberg (2011), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-17955-6_7"},{"key":"10_CR27","unstructured":"Wolkerstorfer, J.: Is Elliptic-Curve Cryptography Suitable for Small Devices? In: Workshop on RFID and Lightweight Crypto, Graz, Austria, July 13-15, pp. 78\u201391 (2005)"},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.-M. Yen","year":"2000","unstructured":"Yen, S.-M., Joye, M.: Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. IEEE Transactions on Computers\u00a049, 967\u2013970 (2000)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21040-2_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T13:17:17Z","timestamp":1619788637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21040-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642210396","9783642210402"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21040-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}