{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:53:22Z","timestamp":1774367602555,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,10,15]],"date-time":"2014-10-15T00:00:00Z","timestamp":1413331200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s12095-014-0111-8","type":"journal-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T03:53:12Z","timestamp":1413258792000},"page":"91-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Horizontal collision correlation attack on elliptic curves"],"prefix":"10.1007","volume":"7","author":[{"given":"Aur\u00e9lie","family":"Bauer","sequence":"first","affiliation":[]},{"given":"Eliane","family":"Jaulmes","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Prouff","sequence":"additional","affiliation":[]},{"given":"Jean-Ren\u00e9","family":"Reinhard","sequence":"additional","affiliation":[]},{"given":"Justine","family":"Wild","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,15]]},"reference":[{"key":"111_CR1","unstructured":"Karatsuba, A., Ofman, Y. (eds.): Multiplication of Many-Digital Numbers by Automatic Computers, vol. 145 (1962)"},{"key":"111_CR2","unstructured":"ANSI X9.62: Public Key Cryptography for the Financial Service Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standards Institute (1998)"},{"key":"111_CR3","unstructured":"ANSI X9.63: Public Key Cryptography for the Financial Service Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. American National Standards Institute (1998)"},{"key":"111_CR4","doi-asserted-by":"crossref","unstructured":"Baek, Y.-J., Vasyltsov, I.: How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method In:. ISPEC, pp. 225\u2013237 (2007)","DOI":"10.1007\/978-3-540-72163-5_18"},{"key":"111_CR5","first-page":"311","volume-title":"Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In: Proceedings on Advances in Cryptology\u2014CRYPTO \u201986","author":"P Barrett","year":"1987","unstructured":"Barrett, P.: Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In: Proceedings on Advances in Cryptology\u2014CRYPTO \u201986, pp 311\u2013323. Springer-Verlag, London (1987)"},{"issue":"2","key":"111_CR6","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s00145-010-9084-8","volume":"24","author":"L Batina","year":"2011","unstructured":"Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.-X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptol. 24(2), 269\u2013291 (2011)","journal-title":"J. Cryptol."},{"key":"111_CR7","doi-asserted-by":"crossref","unstructured":"Bauer, A., Jaulmes, E., Prouff, E., Wild, J.: Horizontal and vertical side-channel attacks against secure RSA implementations. In: Dawson, E. (ed.) Topics in Cryptology \u2014 CT-RSA 2013, volume 7779 of Lecture Notes in Computer Science, pp. 1\u201317. Springer (2013)","DOI":"10.1007\/978-3-642-36095-4_1"},{"key":"111_CR8","doi-asserted-by":"crossref","unstructured":"Bauer, A., Jaulmes, E., Prouff, E., Wild, J.: Horizontal collision correlation attack on elliptic curves. In: Lange, T., Lauter, K.E., Lisonek, P. (eds.) Selected Areas in Cryptography, volume 8282 of Lecture Notes in Computer Science, pp. 553\u2013570. Springer (2013)","DOI":"10.1007\/978-3-662-43414-7_28"},{"key":"111_CR9","unstructured":"Bernstein, D.J., Lange, T.: Analysis and Optimization of Elliptic-Curve Single-Scalar Multiplication. Cryptology ePrint Archive, Report 2007\/455, (2007) http:\/\/eprint.iacr.org\/"},{"key":"111_CR10","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Lange, T.: Faster addition and doubling on elliptic curves. In: Kurosawa, K. (ed.) Advances in Cryptology \u2014 Proceedings of ASI-ACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pp. 29\u201350. Springer (2007)","DOI":"10.1007\/978-3-540-76900-2_3"},{"key":"111_CR11","unstructured":"Billet, O., Joye, M.: The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. Cryptology ePrint Archive, Report 2002\/125 (2002)"},{"key":"111_CR12","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Kizhvatov, I., Pyshkin, A.: Algebraic methods in side-channel collision attacks and practical collision detection. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) Progress in Cryptology \u2013 INDOCRYPT 2008, volume 5365 of LNCS, pp. 251\u2013265. Springer-Verlag (2008)","DOI":"10.1007\/978-3-540-89754-5_20"},{"issue":"2","key":"111_CR13","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1093\/qjmam\/4.2.236","volume":"4","author":"A Booth","year":"1951","unstructured":"Booth, A.: A signed binary multiplication technique. Q. J. Mech. Appl. Math. 4(2), 236\u2013240 (1951)","journal-title":"Q. J. Mech. Appl. Math."},{"key":"111_CR14","doi-asserted-by":"crossref","unstructured":"Brickell, E.F.: A survey of hardware implementation of RSA (Abstract). In: CRYPTO, volume 435 of Lecture Notes in Computer Science, pp. 368\u2013370. Springer (1989)","DOI":"10.1007\/0-387-34805-0_34"},{"key":"111_CR15","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES 2004, volume 3156 of Lecture Notes in Computer Science, pp. 16\u201329. Springer (2004)","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"111_CR16","doi-asserted-by":"crossref","unstructured":"Brier, \u00c9., Joye, M.: Weierstra\u00df elliptic curves and side-channel attacks In: Naccache, D., Paillier, P. (eds.) Public Key Cryptography \u2013 PKC 2002, volume 2274 of Lecture Notes in Computer Science, pp. 335\u2013345. Springer (2002 )","DOI":"10.1007\/3-540-45664-3_24"},{"issue":"6","key":"111_CR17","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B Chevallier-Mames","year":"2004","unstructured":"Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Trans. Comput. 53(6), 760\u2013768 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"111_CR18","unstructured":"Ciet, M., Joye, M.: Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. Cryptology ePrint archive, report 2003\/028 (2003)"},{"key":"111_CR19","doi-asserted-by":"crossref","unstructured":"Clavier, C., Feix, B., Gagnerot, G., Giraud, C., Roussellet, M., Verneuil, V.: ROSETTA for single trace analysis \u2013 recovery of secret exponent by triangular trace analysis. In:. INDOCRYPT, pp. 140\u2013155 (2012)","DOI":"10.1007\/978-3-642-34931-7_9"},{"key":"111_CR20","doi-asserted-by":"crossref","unstructured":"Clavier, C., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Horizontal correlation analysis on exponentiation. In: Soriano, M., Qing, S., Lopez, J. (eds.) ICICS, volume 6476 of Lecture Notes in Computer Science, pp. 46\u201361. Springer (2010)","DOI":"10.1007\/978-3-642-17650-0_5"},{"key":"111_CR21","doi-asserted-by":"crossref","unstructured":"Clavier, C., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Improved collision-correlation power analysis on first order protected AES. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems, 13th International Workshop \u2013 CHES 2011, volume 6917 of Lecture Notes in Computer Science, pp. 49\u201362. Springer (2011)","DOI":"10.1007\/978-3-642-23951-9_4"},{"key":"111_CR22","doi-asserted-by":"crossref","unstructured":"Clavier, C., Joye, M.: Universal exponentiation algorithm \u2013 a first step towards provable SPA-Resistance. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Em- bedded Systems \u2013 CHES 2001, volume 2162 of Lecture Notes in Computer Science, pp. 300\u2013308. Springer (2001)","DOI":"10.1007\/3-540-44709-1_25"},{"key":"111_CR23","doi-asserted-by":"crossref","unstructured":"Cohen, H., Frey, G. (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press (2005)","DOI":"10.1201\/9781420034981"},{"issue":"4","key":"111_CR24","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1147\/sj.294.0526","volume":"29","author":"PG Comba","year":"1990","unstructured":"Comba, P.G.: Exponentiation cryptosystems on the IBM PC. IBM Syst. J. 29(4), 526\u2013538 (1990)","journal-title":"IBM Syst. J."},{"key":"111_CR25","doi-asserted-by":"crossref","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES \u201999, volume 1717 of Lecture Notes in Computer Science, pp. 292\u2013302. Springer (1999)","DOI":"10.1007\/3-540-48059-5_25"},{"key":"111_CR26","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"HM Edwards","year":"2007","unstructured":"Edwards, H.M.: A normal form for elliptic curves. Bull. Am. Math. Soc. 44, 393\u2013422 (2007)","journal-title":"Bull. Am. Math. Soc."},{"key":"111_CR27","doi-asserted-by":"crossref","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Ko\u00e7 \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems CHES 2001, volume 2162 of Lecture Notes in Computer Science, pp. 251\u2013261. Springer (2001)","DOI":"10.1007\/3-540-44709-1_21"},{"key":"111_CR28","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES, volume 5154 of Lecture Notes in Computer Science, pp. 426\u2013442. Springer (2008)","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"111_CR29","doi-asserted-by":"crossref","unstructured":"Giraud, C., Verneuil, V.: Atomicity improvement for elliptic curve scalar multiplication. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) Smart Card Research and Advanced Applications, 9th International Conference \u2013 CARDIS 2010, volume 6035 of Lecture Notes in Computer Science, pp. 80\u2013101. Springer (2010)","DOI":"10.1007\/978-3-642-12510-2_7"},{"key":"111_CR30","doi-asserted-by":"crossref","unstructured":"Goli\u0107, J., Tymen, C.: Multiplicative masking and power analysis of AES. In: Kaliski, B.S. Jr., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES 2002, volume 2523 of Lecture Notes in Computer Science, pp. 198\u2013212. Springer (2002)","DOI":"10.1007\/3-540-36400-5_16"},{"issue":"2","key":"111_CR31","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s13389-011-0012-0","volume":"1","author":"RR Goundar","year":"2011","unstructured":"Goundar, R.R., Joye, M., Miyaji, A., Rivain, M., Venelli, A.: Scalar multiplication on Weierstra\u00df elliptic curves from co-z arithmetic. J. Cryptographic Engineering 1(2), 161\u2013176 (2011)","journal-title":"J. Cryptographic Engineering"},{"key":"111_CR32","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to elliptic curve cryptography. In: Springer Professional Computing Series (2003)"},{"key":"111_CR33","unstructured":"ISO\/IEC JTC1 SC17 WG3\/TF5 for the International Civil Aviation Organization: Supplemental Access Control for Machine Readable Travel Documents. Technical Report (2010)"},{"key":"111_CR34","doi-asserted-by":"crossref","unstructured":"Joye, M., Tymen, C.: Protections against differential analysis for elliptic curve cryptography. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES 2001, volume 2162 of Lecture Notes in Computer Science, pp. 386\u2013400. Springer","DOI":"10.1007\/3-540-44709-1_31"},{"key":"111_CR35","doi-asserted-by":"crossref","unstructured":"Joye, M.: Highly regular right-to-left algorithms for scalar multiplication. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES 2007, volume 4727 of Lecture Notes in Computer Science, pp. 135\u2013147. Springer (2007)","DOI":"10.1007\/978-3-540-74735-2_10"},{"key":"111_CR36","unstructured":"Knuth, D.E.: The Art of Computer Programming, vol. 2, 3rd edn. Addison Wesley (1988)"},{"issue":"177","key":"111_CR37","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"111_CR38","doi-asserted-by":"crossref","unstructured":"Ko\u00e7, \u00c7.K: Cryptographic Engineering. Springer (2008)","DOI":"10.1007\/978-0-387-71817-0"},{"key":"111_CR39","doi-asserted-by":"crossref","unstructured":"Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) Advances in Cryptology \u2013 CRYPTO \u201996, volume 1109 of Lecture Notes in Computer Science, pp. 104\u2013113. Springer (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"111_CR40","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) Advances in Cryptology \u2013 CRYPTO \u201999, volume 1666 of Lecture Notes in Computer Science, pp. 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"1","key":"111_CR41","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"PC Kocher","year":"1998","unstructured":"Kocher, P.C., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptographic Engineering 1(1), 5\u201327 (1998)","journal-title":"J. Cryptographic Engineering"},{"key":"111_CR42","doi-asserted-by":"crossref","unstructured":"Liardet, P.-Y., Smart, N.P.: Preventing SPA\/DPA in ECC systems using the Jacobi form. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES 2001, volume 2162 of Lecture Notes in Computer Science, pp. 401\u2013411. Springer (2001)","DOI":"10.1007\/3-540-44709-1_32"},{"key":"111_CR43","unstructured":"Longa, P.: Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields. Master\u2019s thesis: School of Information Technology and Engineering, University of Ottawa, Canada (2007)"},{"key":"111_CR44","doi-asserted-by":"crossref","unstructured":"Micali, S., Reyzin, L.: Physically observable cryptography (Extended Abstract). In: Naor, M. (ed.) Theory of Cryptography Conference \u2013 TCC 2004, volume 2951 of Lecture Notes in Computer Science, pp. 278\u2013296. Springer (2004)","DOI":"10.1007\/978-3-540-24638-1_16"},{"key":"111_CR45","doi-asserted-by":"crossref","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Wiliams, H.C. (ed.) Advances in Cryptology \u2013 CRYPTO \u201985, volume 218 of Lecture Notes in Computer Science, pp. 417\u2013426. Springer (1985)","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"170","key":"111_CR46","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comp. 44(170), 519\u2013521 (1985)","journal-title":"Math. Comp."},{"key":"111_CR47","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48, 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"111_CR48","doi-asserted-by":"crossref","unstructured":"Moradi, A.: Statistical tools flavor side-channel collision attacks. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, pp. 428\u2013445. Springer (2012)","DOI":"10.1007\/978-3-642-29011-4_26"},{"key":"111_CR49","doi-asserted-by":"crossref","unstructured":"Moradi, A., Mischke, O., Eisenbarth, T.: Correlation-enhanced power analysis collision attack. In: Mangard, S., Standaert, F.-X. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings, volume 6225 of Lecture Notes in Computer Science, pp. 125\u2013139. Springer (2010)","DOI":"10.1007\/978-3-642-15031-9_9"},{"issue":"6","key":"111_CR50","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1109\/TC.2009.15","volume":"58","author":"E Prouff","year":"2009","unstructured":"Prouff, E., Rivain, M., B\u00e9van, R.: Statistical analysis of second order differential power a.nalysis. IEEE Trans. Comput. 58(6), 799\u2013811 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"111_CR51","unstructured":"Quisquater, J.-J., Samyde, D.: A new tool for non intrusive analysis of smart cards based on electro-magnetic emissions, the SEMA and DEMA methods. Presented at the rump session of EUROCRYPT 2000 (2000)"},{"key":"111_CR52","doi-asserted-by":"crossref","unstructured":"Schramm, K., Wollinger, T., Paar, C.: In: Johansson, T. (ed.) Fast Software En- cryption \u2013 FSE 2003, volume 2887 of Lecture Notes in Computer Science, pp. 206\u2013222. Springer (2003)","DOI":"10.1007\/978-3-540-39887-5_16"},{"key":"111_CR53","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel attacks. In: EUROCRYPT, volume 5479, Lecture Notes in computer science. pp. 443\u2013461. Springer (2009)","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"111_CR54","doi-asserted-by":"crossref","unstructured":"Tunstall, M., Joye, M.: Coordinate blinding over large prime fields. In: Mangard, S., Standaert, F.-X. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings, volume 6225 of Lecture Notes in Computer Science. Springer (2010)","DOI":"10.1007\/978-3-642-15031-9_30"},{"key":"111_CR55","unstructured":"Verneuil, V.: Elliptic Curve Cryptography and Security of Embedded Devices, PhD thesis, Universite de Bordeaux (2012)"},{"key":"111_CR56","doi-asserted-by":"crossref","unstructured":"Walter, C.D.: Sliding windows succumbs to big Mac attack. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES 2001, volume 2162 of Lecture Notes in Computer Science. Springer (2001)","DOI":"10.1007\/3-540-44709-1_24"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0111-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0111-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0111-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T22:33:35Z","timestamp":1650407615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0111-8"}},"subtitle":["\u2013 Extended Version \u2013"],"short-title":[],"issued":{"date-parts":[[2014,10,15]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["111"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0111-8","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,15]]}}}