{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:39:02Z","timestamp":1756384742261},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662434130"},{"type":"electronic","value":"9783662434147"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_28","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:57:06Z","timestamp":1400597826000},"page":"553-570","source":"Crossref","is-referenced-by-count":41,"title":["Horizontal Collision Correlation Attack on Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Aur\u00e9lie","family":"Bauer","sequence":"first","affiliation":[]},{"given":"Eliane","family":"Jaulmes","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Prouff","sequence":"additional","affiliation":[]},{"given":"Justine","family":"Wild","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"key":"28_CR1","unstructured":"ANSI X9.62: Public Key Cryptography for The Financial Service Industry : The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standards Institute (1998)"},{"key":"28_CR2","unstructured":"ANSI X9.63: Public Key Cryptography for The Financial Service Industry : Key Agreement and Key Transport Using Elliptic Curve Cryptography. American National Standards Institute (1998)"},{"issue":"2","key":"28_CR3","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.-X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptol. 24(2), 269\u2013291 (2011). (to appear)","journal-title":"J. Cryptol."},{"key":"28_CR4","series-title":"LNCS","first-page":"1","volume-title":"CT-RSA 2013","author":"A Bauer","year":"2013","unstructured":"Bauer, A., Jaulmes, E., Prouff, E., Wild, J.: Horizontal and vertical side-channel attacks against secure RSA implementations. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 1\u201317. Springer, Heidelberg (2013)"},{"key":"28_CR5","unstructured":"Bernstein, D.J., Lange, T.: Analysis and optimization of elliptic-curve single-scalar multiplication. Cryptology ePrint Archive, Report 2007\/455 \n                      http:\/\/eprint.iacr.org\/\n                      \n                     (2007)"},{"key":"28_CR6","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-540-76900-2_3","volume-title":"ASIACRYPT 2007","author":"DJ Bernstein","year":"2007","unstructured":"Bernstein, D.J., Lange, T.: Faster addition and doubling on elliptic curves. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 29\u201350. Springer, Heidelberg (2007)"},{"key":"28_CR7","unstructured":"Billet, O., Joye, M.: The Jacobi model of an elliptic curve and side-channel analysis. Cryptology ePrint Archive, Report 2002\/125 (2002)"},{"key":"28_CR8","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-89754-5_20","volume-title":"INDOCRYPT 2008","author":"A Bogdanov","year":"2008","unstructured":"Bogdanov, A., Kizhvatov, I., Pyshkin, A.: Algebraic methods in side-channel collision attacks and practical collision detection. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 251\u2013265. Springer, Heidelberg (2008)"},{"key":"28_CR9","series-title":"LNCS","first-page":"16","volume-title":"CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, Ch., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"28_CR10","series-title":"LNCS","first-page":"335","volume-title":"PKC 2002","author":"E Brier","year":"2002","unstructured":"Brier, E., Joye, M.: Weierstra\u00df elliptic curves and side-channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 335\u2013345. Springer, Heidelberg (2002)"},{"issue":"6","key":"28_CR11","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B Chevallier-Mames","year":"2004","unstructured":"Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Trans. Comput. 53(6), 760\u2013768 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"28_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-34931-7_9","volume-title":"INDOCRYPT 2012","author":"Ch Clavier","year":"2012","unstructured":"Clavier, Ch., Feix, B., Gagnerot, G., Giraud, Ch., Roussellet, M., Verneuil, V.: ROSETTA for single trace analysis. In: Galbraith, S., Nandi, M. (eds.) INDOCRYPT 2012. LNCS, vol. 7668, pp. 140\u2013155. Springer, Heidelberg (2012)"},{"key":"28_CR13","series-title":"LNCS","first-page":"46","volume-title":"ICICS 2010","author":"Ch Clavier","year":"2010","unstructured":"Clavier, Ch., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Horizontal correlation analysis on exponentiation. In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 46\u201361. Springer, Heidelberg (2010)"},{"key":"28_CR14","series-title":"LNCS","first-page":"49","volume-title":"CHES 2011","author":"Ch Clavier","year":"2011","unstructured":"Clavier, Ch., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Improved collision-correlation power analysis on first order protected AES. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 49\u201362. Springer, Heidelberg (2011)"},{"volume-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","year":"2005","key":"28_CR15","unstructured":"Cohen, H., Frey, G. (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Baco Raton (2005)"},{"key":"28_CR16","series-title":"LNCS","first-page":"292","volume-title":"CHES 1999","author":"J-S Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"28_CR17","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"HM Edwards","year":"2007","unstructured":"Edwards, H.M.: A normal form for elliptic curves. Bull. Am. Math. Soc. 44, 393\u2013422 (2007)","journal-title":"Bull. Am. Math. Soc."},{"key":"28_CR18","series-title":"LNCS","first-page":"80","volume-title":"CARDIS 2010","author":"Ch Giraud","year":"2010","unstructured":"Giraud, Ch., Verneuil, V.: Atomicity improvement for elliptic curve scalar multiplication. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 80\u2013101. Springer, Heidelberg (2010)"},{"key":"28_CR19","series-title":"Springer Professional Computing Series","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer Professional Computing Series. Springer, New York (2003)"},{"key":"28_CR20","unstructured":"ISO\/IEC JTC1 SC17 WG3\/TF5 for the International Civil Aviation Organization. Supplemental Access Control for Machine Readable Travel Documents. Technical Report (2010)"},{"issue":"177","key":"28_CR21","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"28_CR22","series-title":"LNCS","volume-title":"CHES 2001","year":"2001","unstructured":"Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.): CHES 2001. LNCS, vol. 2162. Springer, Heidelberg (2001)"},{"key":"28_CR23","series-title":"LNCS","first-page":"104","volume-title":"CRYPTO 1996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"28_CR24","series-title":"LNCS","first-page":"388","volume-title":"CRYPTO 1999","author":"PC Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"28_CR25","unstructured":"Liardet, P.-Y., Smart, N.P.: Preventing SPA\/DPA in ECC systems using the Jacobi form. In: Ko\u00e7, \u00c7.K., et al. (eds.) [22], pp. 401\u2013411"},{"key":"28_CR26","unstructured":"Longa, P.: Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields. Master\u2019s thesis, School of Information Technology and Engineering, University of Ottawa, Canada (2007)"},{"key":"28_CR27","series-title":"LNCS","first-page":"238","volume-title":"CHES 2000","author":"TS Messerges","year":"2000","unstructured":"Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Paar, Ch., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238\u2013251. Springer, Heidelberg (2000)"},{"key":"28_CR28","series-title":"LNCS","first-page":"278","volume-title":"TCC 2004","author":"S Micali","year":"2004","unstructured":"Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278\u2013296. Springer, Heidelberg (2004)"},{"key":"28_CR29","series-title":"LNCS","first-page":"417","volume-title":"CRYPTO 1985","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"28_CR30","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-642-29011-4_26","volume-title":"EUROCRYPT 2012","author":"A Moradi","year":"2012","unstructured":"Moradi, A.: Statistical tools flavor side-channel collision attacks. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 428\u2013445. Springer, Heidelberg (2012)"},{"key":"28_CR31","series-title":"LNCS","first-page":"125","volume-title":"CHES 2010","author":"A Moradi","year":"2010","unstructured":"Moradi, A., Mischke, O., Eisenbarth, T.: Correlation-enhanced power analysis collision attack. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 125\u2013139. Springer, Heidelberg (2010)"},{"key":"28_CR32","series-title":"LNCS","first-page":"206","volume-title":"FSE 2003","author":"K Schramm","year":"2003","unstructured":"Schramm, K., Wollinger, T., Paar, Ch.: A new class of collision attacks and its application to des. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 206\u2013222. Springer, Heidelberg (2003)"},{"key":"28_CR33","doi-asserted-by":"crossref","unstructured":"Walter, C.D.: Sliding windows succumbs to big mac attack. In: Ko\u00e7, \u00c7.K., et al. (eds.) [22], pp. 286\u2013299","DOI":"10.1007\/3-540-44709-1_24"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:48:27Z","timestamp":1558907307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}