{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:18:00Z","timestamp":1743153480416,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291654"},{"type":"electronic","value":"9783642291661"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29166-1_33","type":"book-chapter","created":{"date-parts":[[2012,3,14]],"date-time":"2012-03-14T13:48:57Z","timestamp":1331732937000},"page":"372-383","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks"],"prefix":"10.1007","author":[{"given":"John","family":"Barron","sequence":"first","affiliation":[]},{"given":"Todd R.","family":"Andel","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"33_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM\u00a021, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"33_CR3","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag New York, Inc., Secaucus (2007)"},{"key":"33_CR4","unstructured":"Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A., Rivest, R.L.: Handbook of Applied Cryptography (1997)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Nedjah, N., Mourelle, L.: Efficient hardware for modular exponentiation using the sliding-window method with variable-length partitioning. In: Proc. 9th Int. Conf. for Young Computer Scientists ICYCS 2008, pp. 1980\u20131985 (2008)","DOI":"10.1109\/ICYCS.2008.421"},{"issue":"2","key":"33_CR6","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1093\/qjmam\/4.2.236","volume":"4","author":"A.D. Booth","year":"1951","unstructured":"Booth, A.D.: A signed binary multiplication technique. The Quarterly Journal of Mechanics and Applied Mathematics\u00a04(2), 236\u2013240 (1951)","journal-title":"The Quarterly Journal of Mechanics and Applied Mathematics"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Daly, A., Marnane, W.: Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic. In: Proceedings of the 2002 ACM\/SIGDA Tenth International Symposium on Field-Programmable Gate Arrays, FPGA 2002, New York, NY, USA, pp. 40\u201349. ACM (2002)","DOI":"10.1145\/503048.503055"},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Computation\u00a044, 519\u2013521 (1985)","journal-title":"Math. Computation"},{"key":"33_CR9","volume-title":"Computer organization & design: the hardware\/software interface","author":"D.A. Patterson","year":"1993","unstructured":"Patterson, D.A., Hennessy, J.L.: Computer organization & design: the hardware\/software interface. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1109\/TC.2009.176","volume":"59","author":"N. Homma","year":"2010","unstructured":"Homma, N., Miyamoto, A., Aoki, T., Satoh, A., Samir, A.: Comparative power analysis of modular exponentiation algorithms. IEEE Trans. Comput.\u00a059, 795\u2013807 (2010)","journal-title":"IEEE Trans. Comput."},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-540-45238-6_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"P.-A. Fouque","year":"2003","unstructured":"Fouque, P.-A., Valette, F.: The Doubling Attack \u2013 Why Upwards Is Better than Downwards. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 269\u2013280. Springer, Heidelberg (2003)"},{"key":"33_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/11554868_13","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"S.-M. Yen","year":"2005","unstructured":"Yen, S.-M., Lien, W.-C., Moon, S.-J., Ha, J.C.: Power Analysis by Exploiting Chosen Message and Internal Collisions \u2013 Vulnerability of Checking Mechanism for RSA-Decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 183\u2013195. Springer, Heidelberg (2005), doi:10.1007\/11554868_13"},{"key":"33_CR13","unstructured":"Popp, T., Mangard, S.: Implementation aspects of the DPA-resistant logic style MDPL. In: Proc. IEEE Int. Symp. Circuits and Systems ISCAS (2006)"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Ambrose, J.A., Parameswaran, S., Ignjatovic, A.: MUTE-AES: A multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. In: IEEE\/ACM International Conference on Computer-Aided Design, ICCAD 2008, pp. 678\u2013684 (November 2008)","DOI":"10.1109\/ICCAD.2008.4681650"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Sauvage, L., Guilley, S., Danger, J.-L., Mathieu, Y., Nassar, M.: Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints. In: Design, Automation Test in Europe Conference Exhibition, DATE 2009, pp. 640\u2013645 (April 2009)","DOI":"10.1109\/DATE.2009.5090745"}],"container-title":["Communications in Computer and Information Science","Information Systems, Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29166-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T15:49:09Z","timestamp":1714751349000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-29166-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291654","9783642291661"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29166-1_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}