{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:35:22Z","timestamp":1725701722774},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642330261"},{"type":"electronic","value":"9783642330278"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33027-8_32","type":"book-chapter","created":{"date-parts":[[2012,9,5]],"date-time":"2012-09-05T12:52:20Z","timestamp":1346849540000},"page":"548-564","source":"Crossref","is-referenced-by-count":10,"title":["An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor"],"prefix":"10.1007","author":[{"given":"Jen-Wei","family":"Lee","sequence":"first","affiliation":[]},{"given":"Szu-Chi","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Hsie-Chia","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Chen-Yi","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"2001","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystems. Math. Comp.\u00a048, 203\u2013209 (2001)","journal-title":"Math. Comp."},{"key":"32_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"issue":"9","key":"32_CR3","doi-asserted-by":"publisher","first-page":"1946","DOI":"10.1109\/TCSI.2006.880184","volume":"53","author":"C.J. McIvor","year":"2006","unstructured":"McIvor, C.J., McLoone, M., McCanny, J.V.: Hardware Elliptic Curve Cryptographic Processor over GF(p). IEEE Trans. Circuits Syst. I\u00a053(9), 1946\u20131957 (2006)","journal-title":"IEEE Trans. Circuits Syst. I"},{"issue":"9","key":"32_CR4","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1109\/TC.2007.1071","volume":"56","author":"K. Sakiyama","year":"2007","unstructured":"Sakiyama, K., Batina, L., Preneel, B., Verbauwhede, I.: Multicore Curve-Based Cryptoprocessor With Reconfigurable Modular Arithmetic Logic Units over GF(2\n                    n\n                  ). IEEE Trans. Comput.\u00a056(9), 1269\u20131282 (2007)","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"32_CR5","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/TCSII.2009.2019327","volume":"56","author":"J.-Y. Lai","year":"2009","unstructured":"Lai, J.-Y., Huang, C.-T.: A Highly Efficient Cipher Processor for Dual-Field Elliptic Curve Cryptography. IEEE Trans. Circuits Syst. II\u00a056(5), 394\u2013398 (2009)","journal-title":"IEEE Trans. Circuits Syst. II"},{"issue":"8","key":"32_CR6","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TVLSI.2009.2020397","volume":"18","author":"J.-H. Chen","year":"2010","unstructured":"Chen, J.-H., Shieh, M.-D., Lin, W.-C.: A High-Performance Unified-Field Reconfigurable Cryptographic Processor. IEEE Trans. VLSI Syst.\u00a018(8), 1145\u20131158 (2010)","journal-title":"IEEE Trans. VLSI Syst."},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P. Montgomery","year":"1987","unstructured":"Montgomery, P.: Speeding the Pollard and Elliptic Curve Methods of Factorization. Math. Comp.\u00a048, 243\u2013264 (1987)","journal-title":"Math. Comp."},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Lee, J.-W., Chen, Y.-L., Tseng, C.-Y., Chang, H.-C., Lee, C.-Y.: A 521-bit Dual-Field Elliptic Curve Cryptographic Processor With Power Analysis Resistance. In: European Solid-State Circuits Conference (ESSCIRC 2010), pp. 206\u2013209 (2010)","DOI":"10.1109\/ESSCIRC.2010.5619893"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"32_CR11","unstructured":"IEEE: Standard Specifications or Public-Key Cryptography. IEEE Std. 1363 (2000)"},{"issue":"4","key":"32_CR12","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/JSSC.2006.870913","volume":"41","author":"D. Hwang","year":"2006","unstructured":"Hwang, D., Tiri, K., Hodjat, A., Lai, B.-C., Yang, S., Schaumont, P., Verbauwhede, I.: AES-Based Security Coprocessor IC in 0.18-\u03bcm CMOS With Resistance to Differential Power Analysis Side-Channel Attacks. IEEE J. Solid-State Circuits\u00a041(4), 781\u2013792 (2006)","journal-title":"IEEE J. Solid-State Circuits"},{"issue":"1","key":"32_CR13","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/JSSC.2009.2034081","volume":"45","author":"C. Tokunaga","year":"2010","unstructured":"Tokunaga, C., Blaauw, D.: Securing Encryption Systems With a Switched Capacitor Current Equalizer. IEEE J. Solid-State Circuits\u00a045(1), 23\u201331 (2010)","journal-title":"IEEE J. Solid-State Circuits"},{"issue":"2","key":"32_CR14","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/TCSII.2011.2180094","volume":"59","author":"P.-C. Liu","year":"2012","unstructured":"Liu, P.-C., Chang, H.-C., Lee, C.-Y.: A True Random-Based Differential Power Analysis Countermeasure Circuit for an AES Engine. IEEE Trans. Circuits Syst. II\u00a059(2), 103\u2013107 (2012)","journal-title":"IEEE Trans. Circuits Syst. II"},{"key":"32_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"32_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/3-540-44709-1_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"M. Joye","year":"2001","unstructured":"Joye, M., Tymen, C.: Protections against Differential Analysis for Elliptic Curve Cryptography. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 377\u2013390. Springer, Heidelberg (2001)"},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P. Montgomery","year":"1985","unstructured":"Montgomery, P.: Modular Multiplication Without Trial Division. Math. Comp.\u00a044, 519\u2013521 (1985)","journal-title":"Math. Comp."},{"issue":"8","key":"32_CR18","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/12.403725","volume":"44","author":"B. Kaliski","year":"1995","unstructured":"Kaliski, B.: The Montgomery Inverse and Its Applications. IEEE Trans. Comput.\u00a044(8), 1064\u20131065 (1995)","journal-title":"IEEE Trans. Comput."},{"key":"32_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"H. Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 51\u201365. Springer, Heidelberg (1998)"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/TC.2006.164","volume":"55","author":"J.D. Golic","year":"2006","unstructured":"Golic, J.D.: New Methods for Digital Generation and Postprocessing of Random Data. IEEE Trans. Comp.\u00a055, 1217\u20131229 (2006)","journal-title":"IEEE Trans. Comp."},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Chen, Y.-L., Lee, J.-W., Liu, P.-C., Chang, H.-C., Lee, C.-Y.: A Dual-Field Elliptic Curve Cryptographic Processor With a Radix-4 Unified Division Unit. In: IEEE Int. Symp. on Circuits Syst. (ISCAS 2011), pp. 713\u2013716 (2011)","DOI":"10.1109\/ISCAS.2011.5937665"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33027-8_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:52:10Z","timestamp":1620129130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33027-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642330261","9783642330278"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33027-8_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}