{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:10:59Z","timestamp":1725865859096},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811027406"},{"type":"electronic","value":"9789811027413"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2741-3_1","type":"book-chapter","created":{"date-parts":[[2016,9,25]],"date-time":"2016-09-25T23:27:31Z","timestamp":1474846051000},"page":"3-14","source":"Crossref","is-referenced-by-count":0,"title":["A New Sign-Change Attack on the Montgomery Ladders"],"prefix":"10.1007","author":[{"given":"Lynn Margaret","family":"Batten","sequence":"first","affiliation":[]},{"given":"Mohammed Khalil","family":"Amain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,27]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44, 519\u2013521 (1985)","journal-title":"Math. Comput."},{"key":"1_CR2","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48, 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","first-page":"291","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M Joye","year":"2002","unstructured":"Joye, M., Yen, S.-M.: The Montgomery powering ladder. In: Walter, C.D., Koc, C.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2779, pp. 291\u2013302. Springer, Heidelberg (2002)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-540-74735-2_10","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"M Joye","year":"2007","unstructured":"Joye, M.: Highly regular right-to-left algorithms for scalar multiplication. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 135\u2013147. Springer, Heidelberg (2007)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-642-28368-0_18","volume-title":"Cryptography and Security: From Theory to Applications","author":"J Fan","year":"2012","unstructured":"Fan, J., Verbauwhede, I.: An updated survey on secure ECC implementations: attacks, countermeasures and cost. In: Cramer, R. (ed.) Cryphtography and Security: From Theory to Applications. LNCS, vol. 7194, pp. 265\u2013282. Springer, Heidelberg (2012)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-13039-2_1","volume-title":"Progress in Cryptology\u2013INDOCRYPT 2014","author":"B Feix","year":"2014","unstructured":"Feix, B., Roussellet, M., Venelli, A.: Side-channel analysis on blinded regular scalar multiplications. In: Meier, W., Mukhopadhyay, D. (eds.) Progress in Cryptology\u2013INDOCRYPT 2014. LNCS, vol. 8885, pp. 3\u201320. Springer, Heidelberg (2014)"},{"key":"1_CR7","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/TVLSI.2015.2453360","volume":"24","author":"L Li","year":"2016","unstructured":"Li, L., Li, S.: High-performance pipelined architecture of elliptic curve scalar multiplication over GF (2\u00a0m). IEEE Trans. Very Large Scale Integr. Syst. 24, 1223\u20131232 (2016)","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"1_CR8","unstructured":"Maplesoft 2015, \u2018User Manual\u2019. http:\/\/www.maplesoft.com\/documentation_center\/"},{"key":"1_CR9","unstructured":"Galbraith, S., Gaudry, P.: Recent progress on the elliptic curve discrete logarithm problem. Number 1022 in the IACR eprint Archive (2015). ( https:\/\/eprint.iacr.org\/2015\/1022.pdf )"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Fan, J., Guo, X., De Mulder, E., Schaumont, P., Preneel, B., Verbauwhede, I.: State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures. In: 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 76\u201387. IEEE Press, New York (2010)","DOI":"10.1109\/HST.2010.5513110"},{"key":"1_CR11","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"SM Yen","year":"2000","unstructured":"Yen, S.M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. Comput. 49, 967\u2013970 (2000)","journal-title":"IEEE Trans. Comput."},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/11734727_11","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S-M Yen","year":"2006","unstructured":"Yen, S.-M., Ko, L.-C., Moon, S.-J., Ha, J.C.: Relative doubling attack against montgomery ladder. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 117\u2013128. Springer, Heidelberg (2006)"},{"key":"1_CR13","series-title":"London Mathematical Society Lecture Notes","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic curves in cryptography","author":"IF Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.: Elliptic curves in cryptography. London Mathematical Society Lecture Notes, vol. 265. Cambridge University Press, Cambridge (1999)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1007\/978-3-662-47989-6_34","volume-title":"Advances in Cryptology \u2013CRYPTO 2015","author":"M Hamburg","year":"2015","unstructured":"Hamburg, M.: Decaf: Eliminating cofactors through point compression. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9216, pp. 705\u2013723. Springer, Heidelberg (2015)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Karaklaji, D.K., Fan, J., Schmidt, J.R.M., Verbauwhede, I.: Low-cost fault detection method for ECC using Montgomery powering ladder. In: Proceedings of\u00a0Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1\u20136. IEEE Computer Society (2011)","DOI":"10.1109\/DATE.2011.5763165"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/978-3-540-24676-3_16","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Naccache","year":"2004","unstructured":"Naccache, D., Smart, N.P., Stern, J.: Projective coordinates leak. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 257\u2013267. Springer, Heidelberg (2004)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/3-540-45664-3_20","volume-title":"Public Key Cryptography","author":"T Izu","year":"2002","unstructured":"Izu, T., Takagi, T.: A fast parallel elliptic curve multiplication resistant against side channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 280\u2013296. Springer, Heidelberg (2002)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/3-540-36231-2_24","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"T Izu","year":"2002","unstructured":"Izu, T., M\u00f6ller, B., Takagi, T.: Improved elliptic curve multiplication methods resistant against side channel attacks. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 296\u2013313. Springer, Heidelberg (2002)"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Public Key Cryptography","author":"E Brier","year":"2002","unstructured":"Brier, E., Joye, M.: Weierstra\u00df elliptic curves and side-channel attacks. In: Paillier, P., Naccache, D. (eds.) PKC 2002. LNCS, vol. 2274, pp. 335\u2013345. Springer, Berlin, Heidelberg (2002)"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J-S Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/11889700_4","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"J Bl\u00f6mer","year":"2006","unstructured":"Bl\u00f6mer, J., Otto, M., Seifert, J.-P.: Sign change fault attacks on elliptic curve cryptosystems. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 36\u201352. Springer, Heidelberg (2006)"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2741-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T20:27:48Z","timestamp":1568406468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2741-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811027406","9789811027413"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2741-3_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}