{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T02:50:23Z","timestamp":1648522223024},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,7,4]],"date-time":"2018-07-04T00:00:00Z","timestamp":1530662400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Math.Comput.Sci."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11786-018-0346-4","type":"journal-article","created":{"date-parts":[[2018,7,4]],"date-time":"2018-07-04T02:30:11Z","timestamp":1530671411000},"page":"295-307","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Avoiding Side-Channel Attacks by Computing Isogenous and Isomorphic Elliptic Curves"],"prefix":"10.1007","volume":"12","author":[{"given":"Rodrigo","family":"Abarz\u00faa","sequence":"first","affiliation":[]},{"given":"Santi","family":"Mart\u00ednez","sequence":"additional","affiliation":[]},{"given":"Valeria","family":"Mendoza","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Valera","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"346_CR1","unstructured":"Abarz\u00faa, R., Mart\u00ednez, S., Miret, J.M., Tom\u00e0s, R., Valera, J.: Evitando ataques Side-Channel mediante el c\u00e1lculo de curvas is\u00f3genas e isomorfas. In Proceedings of VII CIBSI, pp. 173\u2013180, Panam\u00e1 (2013)"},{"key":"346_CR2","doi-asserted-by":"crossref","unstructured":"Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thom\u00e9, E., Valenta, L., et al.: Imperfect forward secrecy: how diffie-hellman fails in practice. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 5\u201317. ACM (2015)","DOI":"10.1145\/2810103.2813707"},{"key":"346_CR3","first-page":"218","volume":"2851","author":"T Akishita","year":"2003","unstructured":"Akishita, T., Takagi, T.: Zero-value point attacks on elliptic curve cryptosystem. ISC, LNCS 2851, 218\u2013233 (2003)","journal-title":"ISC, LNCS"},{"key":"346_CR4","first-page":"346","volume":"2947","author":"T Akishita","year":"2004","unstructured":"Akishita, T., Takagi, T.: On the optimal parameter choice for elliptic curve cryptosystems using isogeny. Public Key Cryptogr. (PKC) 2947, 346\u2013359 (2004)","journal-title":"Public Key Cryptogr. (PKC)"},{"key":"346_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography, London Mathematical Society Lecture Notes","author":"IF Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography, London Mathematical Society Lecture Notes, vol. 265. Cambridge University Press, Cambridge (1999)"},{"issue":"4","key":"346_CR6","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s13389-015-0097-y","volume":"6","author":"JW Bos","year":"2016","unstructured":"Bos, J.W., Costello, C., Longa, P., Naehrig, M.: Selecting elliptic curves for cryptography: an efficiency and security analysis. J. Cryptogr. Eng. 6(4), 259\u2013286 (2016)","journal-title":"J. Cryptogr. Eng."},{"key":"346_CR7","unstructured":"Bosma, W., Cannon, J.J.: Handbook of Magma functions. MAGMA Group (1996). \n                    http:\/\/magma.maths.usyd.edu.au\/"},{"issue":"263","key":"346_CR8","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1090\/S0025-5718-08-02066-8","volume":"77","author":"A Bostan","year":"2008","unstructured":"Bostan, A., Morain, F., Salvy, B., Schost, \u00c9.: Fast algorithms for computing isogenies between elliptic curves. Math. Comput. 77(263), 1755\u20131778 (2008)","journal-title":"Math. Comput."},{"key":"346_CR9","doi-asserted-by":"publisher","DOI":"10.1201\/9781420034981","volume-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography. Discrete Mathematics and its Applications","author":"H Cohen","year":"2005","unstructured":"Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Discrete Mathematics and its Applications. CRC Press, Boca Raton (2005)"},{"issue":"8250","key":"346_CR10","first-page":"197","volume":"2013","author":"B Feix","year":"2013","unstructured":"Feix, B., Verneuil, V.: There\u2019s something about \n                    \n                      \n                    \n                    $$m$$\n                    \n                      \n                        m\n                      \n                    \n                  -ary. Fixed-point scalar multiplication protected against physical attacks. Prog. Cryptol. INDOCRYPT 2013(8250), 197\u2013214 (2013)","journal-title":"Prog. Cryptol. INDOCRYPT"},{"key":"346_CR11","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/3-540-45455-1_23","volume":"2369","author":"M Fouquet","year":"2002","unstructured":"Fouquet, M., Morain, F.: Isogeny volcanoes and the SEA algorithm. Algorithmic Number Theory (ANTS-V) LNCS 2369, 276\u2013291 (2002)","journal-title":"Algorithmic Number Theory (ANTS-V) LNCS"},{"key":"346_CR12","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1112\/S1461157000000097","volume":"2","author":"SD Galbraith","year":"1999","unstructured":"Galbraith, S.D.: Constructing isogenies between elliptic curves over finite fields. LMS J. Comput. Math. 2, 118\u2013138 (1999)","journal-title":"LMS J. Comput. Math."},{"key":"346_CR13","unstructured":"Giry, D., Quisquater, J-J.: BlueKrypt. Cryptographic Key Length Recommendation. \n                    http:\/\/www.keylength.com\/\n                    \n                  . February 2015. v 28.6"},{"key":"346_CR14","first-page":"199","volume":"2567","author":"L Goubin","year":"2003","unstructured":"Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. Public Key Cryptogr. (PKC) LNCS 2567, 199\u2013211 (2003)","journal-title":"Public Key Cryptogr. (PKC) LNCS"},{"key":"346_CR15","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Berlin (2003)"},{"key":"346_CR16","doi-asserted-by":"crossref","unstructured":"Jao, D., Miller, S.D., Venkatesan, R.: Do all elliptic curves of the same order have the same difficulty of discrete log? In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 21\u201340. Springer (2005)","DOI":"10.1007\/11593447_2"},{"issue":"1","key":"346_CR17","first-page":"283","volume":"4","author":"M Joye","year":"2003","unstructured":"Joye, M.: Elliptic curves and side-channel analysis. ST J. Syst. Res. 4(1), 283\u2013306 (2003)","journal-title":"ST J. Syst. Res."},{"issue":"177","key":"346_CR18","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"issue":"6","key":"346_CR19","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00200-013-0211-2","volume":"24","author":"S Mart\u00ednez","year":"2013","unstructured":"Mart\u00ednez, S., Sadornil, D., Tena, J., Tom\u00e0, R., Valls, M.: On Edwards curves and ZVP-attacks. Appl. Algebra Eng. Commun. Comput. (AAECC) 24(6), 507\u2013517 (2013)","journal-title":"Appl. Algebra Eng. Commun. Comput. (AAECC)"},{"key":"346_CR20","doi-asserted-by":"crossref","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Advances in Cryptology\u2014-CRYPTO\u201985, volume 218 of LNCS, pp. 417\u2013426. Springer (1986)","DOI":"10.1007\/3-540-39799-X_31"},{"key":"346_CR21","unstructured":"Miret, J.M., Sadornil, D., Tena, J., Tom\u00e0s, R., Valls, M.: Isogeny cordillera algorithm to obtain cryptographically good elliptic curves. In: Australasian Information Security Workshop: Privacy Enhancing Technologies. CRPIT Volume 68, pp. 153\u2013157. Ballarat, Australia (2007)"},{"key":"346_CR22","doi-asserted-by":"crossref","unstructured":"Miret, J.M., Sadornil, D., Tena, J., Tom\u00e1s, R., Valls, M.: On avoiding ZVP-attacks using isogeny volcanoes. In: Workshop on Information Security Applications (WISA\u201908), LNCS (5379), pp. 266\u2013277, 9 September (2009)","DOI":"10.1007\/978-3-642-00306-6_20"},{"key":"346_CR23","doi-asserted-by":"crossref","unstructured":"Murdica, C., Guilley, S., Danger, J-L., Hoogvorst, P., Naccache, D.: Same values power analysis using special points on elliptic curves. In: Constructive Side-Channel Analysis and Secure Design\u2014COSADE, LNCS(7275), pp. 183\u2013198 (2012)","DOI":"10.1007\/978-3-642-29912-4_14"},{"key":"346_CR24","unstructured":"National Institute of Standards and Technology. Recommended elliptic curves for federal government Use. FIPS PUB 186-4, Appendix D. \n                    http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html\n                    \n                   (2013)"},{"key":"346_CR25","doi-asserted-by":"crossref","unstructured":"Smart, N.P.: An analysis of Goubin\u2019s refined power analysis attack. In: Cryptographic Hardware and Embedded Systems (CHES), LNCS(2779), pp. 281\u2013290 (2003)","DOI":"10.1007\/978-3-540-45238-6_23"},{"issue":"2","key":"346_CR26","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/BF01404549","volume":"2","author":"J Tate","year":"1966","unstructured":"Tate, J.: Endomorphisms of abelian varieties over finite fields. Inventiones Mathematicae 2(2), 134\u2013144 (1966)","journal-title":"Inventiones Mathematicae"},{"key":"346_CR27","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. Comptes Rendus de l\u2019Acad\u00e9mie des Sciences de Paris S\u00e9r. AB, 273:A238\u2013A241 (1971)"}],"container-title":["Mathematics in Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11786-018-0346-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11786-018-0346-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11786-018-0346-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T19:21:49Z","timestamp":1562181709000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11786-018-0346-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,4]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["346"],"URL":"https:\/\/doi.org\/10.1007\/s11786-018-0346-4","relation":{},"ISSN":["1661-8270","1661-8289"],"issn-type":[{"value":"1661-8270","type":"print"},{"value":"1661-8289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,4]]},"assertion":[{"value":"9 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}