{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T00:55:58Z","timestamp":1721696158456},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,11,8]],"date-time":"2006-11-08T00:00:00Z","timestamp":1162944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2006,11,8]],"date-time":"2006-11-08T00:00:00Z","timestamp":1162944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1007\/s10623-006-9014-9","type":"journal-article","created":{"date-parts":[[2006,11,7]],"date-time":"2006-11-07T15:36:33Z","timestamp":1162913793000},"page":"43-65","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["On binary signed digit representations of integers"],"prefix":"10.1007","volume":"42","author":[{"given":"Nevine","family":"Ebeid","sequence":"first","affiliation":[]},{"given":"M. Anwar","family":"Hasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,11,8]]},"reference":[{"key":"9014_CR1","doi-asserted-by":"crossref","unstructured":"Cohen H, Miyaji A, Ono T (1998) Efficient elliptic curve exponentiation using mixed coordinates. In: Advances in Cryptology\u2014ASIACRYPT \u201998. vol 1514. LNCS, Springer-Verlag, Berlin, pp 51\u201365","DOI":"10.1007\/3-540-49649-1_6"},{"key":"9014_CR2","unstructured":"Ebeid N, Hasan MA (2003) Analysis of DPA countermeasures based on randomizing the binary algorithm. CACR Technical Reports CORR 2003-14, University of Waterloo"},{"key":"9014_CR3","doi-asserted-by":"crossref","unstructured":"Ebeid N, Hasan MA (2003) On randomizing private keys to counteract DPA attacks. In: Selected Areas in Cryptography\u2014SAC \u201903. vol 3006. LNCS, Springer-Verlag, Berlin, pp 58\u201372","DOI":"10.1007\/978-3-540-24654-1_5"},{"key":"9014_CR4","doi-asserted-by":"crossref","unstructured":"Fouque PA, Muller F, Poupard G, Valette F (2004) Defeating countermeasures based on randomized BSD representations. In: Cryptographic Hardware and Embedded Systems\u2014CHES \u201904. vol 3156 LNCS, Springer-Verlag, Berlin, pp 312\u2013327","DOI":"10.1007\/978-3-540-28632-5_23"},{"key":"9014_CR5","unstructured":"Ha J, Moon S (2002) Randomized signed-scalar multiplication of ECC to resist power attacks. In: Cryptographic Hardware and Embedded Systems\u2014CHES \u201902. vol 2523 LNCS, Springer-Verlag, Berlin, pp 551\u2013563"},{"key":"9014_CR6","volume-title":"Probability and statistical inference volume 1: probability","author":"JG Kalbfleisch","year":"1985","unstructured":"Kalbfleisch JG (1985) Probability and statistical inference volume 1: probability. Springer-Verlag, Berlin"},{"key":"9014_CR7","doi-asserted-by":"crossref","unstructured":"L\u00f3pez J, Dahab R (1999) Improved algorithms for elliptic curve arithmetic in GF(2 n ) without precomputation. In: Selected Areas in Cryptography\u2014SAC \u201998. vol 1556 LNCS, Springer-Verlag, Berlin, pp 201\u2013212","DOI":"10.1007\/3-540-48892-8_16"},{"issue":"6","key":"9014_CR8","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F Morain","year":"1990","unstructured":"Morain F, Olivos J (1990) Speeding up the computations on an elliptic curve using addition-subtraction chains. Informatique th\u00e9orique et Applications\/Theoret Informatics Appl 24(6):531\u2013544","journal-title":"Informatique th\u00e9orique et Applications\/Theoret Informatics Appl"},{"key":"9014_CR9","doi-asserted-by":"crossref","unstructured":"Oswald E, Aigner M (2001) Randomized addition-subtraction chains as a countermeasure against power attacks. In: Cryptographic Hardware and Embedded Systems\u2014CHES \u201901. vol 2162 LNCS, Springer-Verlag, Berlin, pp 39\u201350","DOI":"10.1007\/3-540-44709-1_5"},{"key":"9014_CR10","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/S0065-2458(08)60610-5","volume":"1","author":"GW Reitwiesner","year":"1960","unstructured":"Reitwiesner GW (1960) Binary arithmetic. Adv Comput 1:231\u2013308","journal-title":"Adv Comput"},{"key":"9014_CR11","doi-asserted-by":"crossref","unstructured":"Sim SG, Park DJ, Lee PJ (2004) New power analysis on the Ha-Moon algorithm and the MIST algorithm. In: Information and communications security\u2014ICICS \u201904. vol 3269 LNCS, Springer-Verlag, Berlin, pp 291\u2013304","DOI":"10.1007\/978-3-540-30191-2_23"},{"key":"9014_CR12","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"JA Solinas","year":"2000","unstructured":"Solinas JA (2000) Efficient arithmetic on Koblitz curves. Designs, Codes Cryptogr 19:195\u2013249","journal-title":"Designs, Codes Cryptogr"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9014-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-006-9014-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9014-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-006-9014-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T05:19:15Z","timestamp":1707369555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-006-9014-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11,8]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["9014"],"URL":"https:\/\/doi.org\/10.1007\/s10623-006-9014-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,11,8]]},"assertion":[{"value":"18 October 2005","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2006","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2006","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}