{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:38:29Z","timestamp":1752673109224,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T00:00:00Z","timestamp":1558483200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T00:00:00Z","timestamp":1558483200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11334-019-00346-2","type":"journal-article","created":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T21:11:58Z","timestamp":1558559518000},"page":"87-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Modular exponentiation with inner product to resist higher-order DPA attacks"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5568-1577","authenticated-orcid":false,"given":"Hridoy Jyoti","family":"Mahanta","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ajoy Kumar","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Somnath","family":"Mukhopadhyay","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,5,22]]},"reference":[{"key":"346_CR1","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"Paul Kocher","year":"1999","unstructured":"Kocher P, Joshu J, Jun B (1999) Differential power analysis. In: CRYPTO 1999. LNCS. vol 1666. Springer, Berlin, pp 388\u2013397"},{"key":"346_CR2","volume-title":"Power analysis attacks: revealing the secrets of smart cards","author":"S Mangard","year":"2008","unstructured":"Mangard S, Oswald E, Popp T (2008) Power analysis attacks: revealing the secrets of smart cards, vol 31. Springer, Berlin"},{"key":"346_CR3","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems","author":"Thomas S. Messerges","year":"1999","unstructured":"Messerges TS, Dabdish EA, Sloan RH (1999) Power analysis attacks of modular exponentiation in smartcards. In: CHES-99. Springer, Berlin. pp 144\u2013157"},{"key":"346_CR4","first-page":"339","volume-title":"Lecture Notes in Computer Science","author":"Pierre-Alain Fouque","year":"2006","unstructured":"Fouque PA, Kunz-Jacques S et al (2006) Power attack on small RSA public exponent. In: CHES-06. Springer, Berlin. pp 339\u2013353"},{"key":"346_CR5","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-21554-4_5","volume-title":"Applied Cryptography and Network Security","author":"Werner Schindler","year":"2011","unstructured":"Schindler W, Itoh K (2011) Exponent blinding does not always lift (partial) spa resistance to higher-level security. In: International conference on ACNS, pp 73\u201390"},{"issue":"4","key":"346_CR6","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s13389-014-0081-y","volume":"4","author":"W Schindler","year":"2014","unstructured":"Schindler W, Wiemers A (2014) Power attacks in the presence of exponent blinding. J Cryptogr Eng 4(4):213\u2013236","journal-title":"J Cryptogr Eng"},{"key":"346_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s13389-016-0146-1","volume":"7","author":"W Schindler","year":"2017","unstructured":"Schindler W, Wiemers A (2017) Generic power attacks on RSA with CRT and exponent blinding: new results. J Cryptogr Eng 7:255\u2013272","journal-title":"J Cryptogr Eng"},{"key":"346_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-19074-2_6","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"Marc F. Witteman","year":"2011","unstructured":"Witteman MF, Witteman JG, Menarini F (2011) Defeating RSA multiply-always and message blinding countermeasures. In: CT-RSA-2011, pp 77\u201388"},{"key":"346_CR9","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-29912-4_7","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"Sven Bauer","year":"2012","unstructured":"Bauer S (2012) Attacking exponent blinding in RSA without CRT. In: International conference on COSADE, pp 82\u201388"},{"key":"346_CR10","doi-asserted-by":"crossref","unstructured":"Bauer A, Jaulmes E (2013) Correlation analysis against protected SFM implementations of RSA. In: INDOCRYPT-2013. Springer, pp 98\u2013115","DOI":"10.1007\/978-3-319-03515-4_7"},{"key":"346_CR11","doi-asserted-by":"crossref","unstructured":"Zhao B et al (2016) An improved power attack on small RSA public exponent. In: IEEE 12th international conference on CIS, pp 578\u2013581","DOI":"10.1109\/CIS.2016.0140"},{"key":"346_CR12","unstructured":"Kuzu EA et al (2013) New cross correlation attack methods on the montgomery ladder implementation of RSA. In: 3rd IEEE international advanced computing conference, pp 138\u2013142"},{"key":"346_CR13","unstructured":"Kuzu EA, Tangel A (2014) A new style CPA attack on the ML implementation of RSA. In: IEEE international computer science and engineering conference, pp 323\u2013328"},{"issue":"7","key":"346_CR14","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1109\/TIFS.2015.2411213","volume":"10","author":"M Kaminaga","year":"2015","unstructured":"Kaminaga M, Yoshikawa H, Suzuki T (2015) Double counting in $$2^{t}$$-ary RSA precomputation reveals the secret exponent. IEEE Trans Inf Forensics Secur 10(7):1394\u20131401","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"346_CR15","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/CC.2015.7122478","volume":"12","author":"W Wan","year":"2015","unstructured":"Wan W, Yang W, Chen J (2015) An optimized cross correlation power attack of message blinding exponentiation algorithms. China Commun 12(6):22\u201332","journal-title":"China Commun"},{"issue":"3","key":"346_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/2345770.2345782","volume":"11","author":"JA Ambrose","year":"2012","unstructured":"Ambrose JA, Ragel RG, Parameswaran S (2012) Randomized instruction injection to counter power analysis attacks. ACM Trans Embed Comput Syst 11(3):69\u201397","journal-title":"ACM Trans Embed Comput Syst"},{"issue":"9","key":"346_CR17","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1109\/TC.2006.135","volume":"55","author":"C Giraud","year":"2006","unstructured":"Giraud C (2006) An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Trans Comput 55(9):1116\u20131120","journal-title":"IEEE Trans Comput"},{"key":"346_CR18","unstructured":"Fournaris AP, Koufopavlou O (2012) Protecting CRT RSA against fault and power side channel attacks. In: IEEE computer society annual symposium on VLSI, pp 159\u2013164"},{"key":"346_CR19","doi-asserted-by":"crossref","unstructured":"Liang Y, Bai G (2013) A new FA and SPA resistant implementation of RSA. In: IEEE 3rd international conference on CSNT, pp 893\u2013897","DOI":"10.1109\/ICCSNT.2013.6967249"},{"issue":"3","key":"346_CR20","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1080\/10798587.2015.1118909","volume":"22","author":"Y Choi","year":"2016","unstructured":"Choi Y et al (2016) An improved square-always exponentiation resistant to side-channel attacks on RSA implementation. Intell Autom Soft Comput 22(3):353\u2013363","journal-title":"Intell Autom Soft Comput"},{"issue":"2","key":"346_CR21","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1080\/00207160.2014.935353","volume":"93","author":"H Kim","year":"2016","unstructured":"Kim H et al (2016) A secure exponentiation algorithm resistant to a combined attack on RSA implementation. Int J Comput Math 93(2):258\u2013272","journal-title":"Int J Comput Math"},{"key":"346_CR22","doi-asserted-by":"crossref","unstructured":"Jin JF, Lu EH, Gao XW (2009) Resistance DPA of RSA on smartcard. In: 5th IEEE international conference on information assurance and security, pp 406\u2013409","DOI":"10.1109\/IAS.2009.301"},{"issue":"4","key":"346_CR23","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2560020","volume":"13","author":"H Kim","year":"2014","unstructured":"Kim H et al (2014) Message blinding method requiring no multiplicative inversion for RSA. ACM Trans Embed Comput Syst 13(4):80\u201389","journal-title":"ACM Trans Embed Comput Syst"},{"key":"346_CR24","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"Suresh Chari","year":"1999","unstructured":"Chari S, Jutla C, Rao JR, Rohatgi P (1999) Towards sound approaches to counteract power-analysis attacks. In: CRYPTO-1999. Springer, Berlin, p 791"},{"key":"346_CR25","doi-asserted-by":"crossref","unstructured":"Balasch J et al (2012) Theory and practice of a leakage resilient masking scheme. In: ASIACRYPT-2012. Springer, pp 758\u2013775","DOI":"10.1007\/978-3-642-34961-4_45"},{"key":"346_CR26","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-662-46800-5_19","volume-title":"Advances in Cryptology -- EUROCRYPT 2015","author":"Josep Balasch","year":"2015","unstructured":"Balasch J, Faust S, Gierlichs B (2015) Inner product masking revisited. In: Oswald E, Fischlin M (eds) Advances in cryptology - EUROCRYPT 2015, vol 9056. Springer, Berlin, Heidelberg, pp 486\u2013510"},{"key":"346_CR27","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1007\/978-3-319-70694-8_25","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"Josep Balasch","year":"2017","unstructured":"Balasch J, Faust S, Gierlichs B, Paglialonga C, Standaert FX (2017) Consolidating inner product masking. In: ASIACRYPT-2017. LNCS, vol 10624. Springer, Berlin, pp 724\u2013754"},{"key":"346_CR28","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-28914-9_13","volume-title":"Theory of Cryptography","author":"Stefan Dziembowski","year":"2012","unstructured":"Dziembowski S, Faust S (2012) Leakage-resilient circuits without computational assumptions. In: Theory of cryptography conference, pp 230\u2013247"},{"key":"346_CR29","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/11605805_13","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"Elisabeth Oswald","year":"2006","unstructured":"Oswald E et al (2006) Practical second-order DPA attacks for masked smart card implementations of block ciphers. In: CT-RSA. Springer, Berlin, pp 192\u2013207"},{"key":"346_CR30","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-11925-5_16","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"Benedikt Gierlichs","year":"2010","unstructured":"Gierlichs B et al (2010) Revisiting higher-order DPA attacks: multivariate mutual information analysis. In: CT-RSA, vol 5985. Springer, Berlin, pp 221\u2013234"},{"key":"346_CR31","doi-asserted-by":"crossref","unstructured":"Gierlichs B et al (2008) Mutual information analysis. In: CHES-08. Springer, Berlin, pp 426\u2013442","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"346_CR32","first-page":"429","volume-title":"Lecture Notes in Computer Science","author":"Nicolas Veyrat-Charvillon","year":"2009","unstructured":"Veyrat-Charvillon N, Standaert F (2009) Mutual information analysis: how, when and why? In: CHES-09. Springer, Berlin, pp 429\u2013443"},{"issue":"8","key":"346_CR33","doi-asserted-by":"publisher","first-page":"3423","DOI":"10.1007\/s13369-017-2517-z","volume":"42","author":"HJ Mahanta","year":"2017","unstructured":"Mahanta HJ, Khan AK (2017) Comparative modular exponentiation with randomized exponent to resist power analysis attacks. Arab J Sci Eng 42(8):3423\u20133434","journal-title":"Arab J Sci Eng"},{"issue":"1","key":"346_CR34","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/iet-ifs.2016.0508","volume":"12","author":"HJ Mahanta","year":"2017","unstructured":"Mahanta HJ, Khan AK (2017) Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation. IET Inform Secur 12(1):25\u201333","journal-title":"IET Inform Secur"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-019-00346-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11334-019-00346-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-019-00346-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T23:22:04Z","timestamp":1590016924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11334-019-00346-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,22]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["346"],"URL":"https:\/\/doi.org\/10.1007\/s11334-019-00346-2","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"type":"print","value":"1614-5046"},{"type":"electronic","value":"1614-5054"}],"subject":[],"published":{"date-parts":[[2019,5,22]]},"assertion":[{"value":"11 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}