{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:14:11Z","timestamp":1725794051967},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662434130"},{"type":"electronic","value":"9783662434147"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_12","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:57:06Z","timestamp":1400597826000},"page":"223-243","source":"Crossref","is-referenced-by-count":12,"title":["Faster Hash-Based Signatures with Bounded Leakage"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Eisenbarth","sequence":"first","affiliation":[]},{"given":"Ingo","family":"von Maurich","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"key":"12_CR1","unstructured":"Atmel. ATxmega128A1 Data Sheet. \n                      http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc8067.pdf"},{"key":"12_CR2","unstructured":"Atmel. AVR XMEGA A Manual. \n                      http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc8077.pdf"},{"key":"12_CR3","unstructured":"Atmel. AVR XPLAIN board. \n                      http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc8203.pdf"},{"key":"12_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-21969-6_23","volume-title":"Progress in Cryptology AFRICACRYPT 2011","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., Ereth, S., H\u00fclsing, A., R\u00fcckert, M.: On the security of the winternitz one-time signature scheme. In: Nitaj, A., Pointcheval, D. (eds.) Progress in Cryptology AFRICACRYPT 2011. LNCS, vol. 6737, pp. 363\u2013378. Springer, Berlin \/ Heidelberg (2011)"},{"key":"12_CR5","series-title":"LNCS","first-page":"117","volume-title":"PQCrypto 2011","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., H\u00fclsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117\u2013129. Springer, Heidelberg (2011)"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-88702-7_3","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2009","unstructured":"Buchmann, J., Dahmen, E., Szydlo, M.: Hash-based digital signature schemes. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 35\u201393. Springer, Heidelberg (2009)"},{"key":"12_CR7","series-title":"LNCS","first-page":"13","volume-title":"CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski, B.S., Ko\u00e7, \u00e7K, Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"12_CR8","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11586821_8","volume-title":"Cryptography and Coding 2005","author":"C Dods","year":"2005","unstructured":"Dods, C., Smart, N.P., Stam, M.: Hash based digital signature schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 96\u2013115. Springer, Heidelberg (2005)"},{"key":"12_CR9","series-title":"LNCS","first-page":"343","volume-title":"TCC 2010","author":"S Faust","year":"2010","unstructured":"Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.N.: Leakage-resilient signatures. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 343\u2013360. Springer, Heidelberg (2010)"},{"key":"12_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-38553-7_10","volume-title":"AFRICACRYPT 2013","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A.: W-OTS+ - shorter signatures for hash-based signature schemes. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 173\u2013188. Springer, Heidelberg (2013)"},{"key":"12_CR11","series-title":"LNCS","first-page":"66","volume-title":"SAC 2012","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A., Busold, C., Buchmann, J.: Forward secure signatures on smart cards. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 66\u201380. Springer, Heidelberg (2013)"},{"key":"12_CR12","unstructured":"Intel. Intel Core i7 2620M Specifications. \n                      http:\/\/ark.intel.com\/products\/52231\/Intel-Core-i7-2620M-Processor-(4M-Cache-2_70-GHz)"},{"key":"12_CR13","unstructured":"Intel. Whitepaper on the Intel AES Instructions Set. \n                      http:\/\/software.intel.com\/file\/24917"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Kizhvatov, I.: Side channel analysis of AVR XMEGA crypto engine. In: Proceedings of the 4th Workshop on Embedded Systems Security, WESS \u201909, pp. 8:1\u20138:7. ACM (2009)","DOI":"10.1145\/1631716.1631724"},{"key":"12_CR15","unstructured":"Lamport, L.: Constructing digital signatures from a one-way function. Technical report, CSL-98, SRI, International (1979)"},{"key":"12_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-19074-2_15","volume-title":"Topics in Cryptology CT-RSA 2011","author":"J Lee","year":"2011","unstructured":"Lee, J., Stam, M.: MJH: a faster alternative to MDC-2. In: Kiayias, A. (ed.) Topics in Cryptology CT-RSA 2011. LNCS, vol. 6558, pp. 213\u2013236. Springer, Berlin \/ Heidelberg (2011)"},{"issue":"10A","key":"12_CR17","first-page":"5658","volume":"27","author":"SM Matyas","year":"1985","unstructured":"Matyas, S.M., Meyer, C.H., Oseas, J.: Generating strong one-way functions with cryptographic algorithm. IBM Tech. Discl. Bull. 27(10A), 5658\u20135659 (1985)","journal-title":"IBM Tech. Discl. Bull."},{"key":"12_CR18","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"1997","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997). Algorithm 9.41"},{"key":"12_CR19","series-title":"LNCS","first-page":"218","volume-title":"CRYPTO 1989","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"12_CR20","series-title":"LNCS","first-page":"278","volume-title":"TCC 2004","author":"S Micali","year":"2004","unstructured":"Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278\u2013296. Springer, Heidelberg (2004)"},{"key":"12_CR21","series-title":"LNCS","first-page":"97","volume-title":"CHES 2009","author":"M Renauld","year":"2009","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic side-channel attacks on the AES: why time also matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 97\u2013111. Springer, Heidelberg (2009)"},{"key":"12_CR22","series-title":"LNCS","first-page":"104","volume-title":"CARDIS 2008","author":"S Rohde","year":"2008","unstructured":"Rohde, S., Eisenbarth, T., Dahmen, E., Buchmann, J., Paar, C.: Fast hash-based signatures on constrained devices. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 104\u2013117. Springer, Heidelberg (2008)"},{"key":"12_CR23","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009)"},{"key":"12_CR24","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-14452-3_5","volume-title":"Towards Hardware-Intrinsic Security","author":"F-X Standaert","year":"2010","unstructured":"Standaert, F.-X., Pereira, O., Yu, Y., Quisquater, J.-J., Yung, M., Oswald, E.: Leakage resilient cryptography in practice. In: Sadeghi, A.-R., Naccache, D., Basin, D., Maurer, U. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 99\u2013134. Springer, Heidelberg (2010)"},{"key":"12_CR25","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-540-24676-3_32","volume-title":"EUROCRYPT 2004","author":"M Szydlo","year":"2004","unstructured":"Szydlo, M.: Merkle tree traversal in log space and time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541\u2013554. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:53:58Z","timestamp":1558907638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}