{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:23:30Z","timestamp":1740162210605,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T00:00:00Z","timestamp":1565222400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T00:00:00Z","timestamp":1565222400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s13389-019-00219-1","type":"journal-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T12:02:45Z","timestamp":1565265765000},"page":"263-275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7404-8504","authenticated-orcid":false,"given":"Poulami","family":"Das","sequence":"first","affiliation":[]},{"given":"Debapriya Basu","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,8]]},"reference":[{"key":"219_CR1","doi-asserted-by":"crossref","unstructured":"Amiel, F., Feix, B., Tunstall, M., Whelan, C., Marnane, W.P.: Distinguishing multiplications from squaring operations. In: Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14\u201315, Revised Selected Papers, pp. 346\u2013360 (2008)","DOI":"10.1007\/978-3-642-04159-4_22"},{"key":"219_CR2","unstructured":"Batina, L., Chmielewski, L., Papachristodoulou, L., Schwabe, P., Tunstall, M.: Online template attacks. In: Progress in Cryptology\u2014INDOCRYPT 2014\u201415th International Conference on Cryptology in India, New Delhi, India, December 14\u201317, 2014, Proceedings, pp. 21\u201336 (2014)"},{"issue":"1","key":"219_CR3","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s12095-014-0111-8","volume":"7","author":"A Bauer","year":"2015","unstructured":"Bauer, A., Jaulmes, \u00c9., Prouff, E., Reinhard, J.-R., Wild, J.: Horizontal collision correlation attack on elliptic curves\u2014extended version. Cryptogr. Commun. 7(1), 91\u2013119 (2015)","journal-title":"Cryptogr. Commun."},{"key":"219_CR4","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted edwards curves. In: Progress in Cryptology\u2014AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11\u201314, 2008. Proceedings, pp. 389\u2013405 (2008)"},{"key":"219_CR5","unstructured":"Bernstein. D.J., Lange, T.: Faster addition and doubling on elliptic curves. In: 13th International Conference on the Theory and Application of Cryptology and Information Security Advances in Cryptology\u2014ASIACRYPT 2007, Kuching, Malaysia, December 2\u20136, 2007, Proceedings, pp. 29\u201350 (2007)"},{"key":"219_CR6","unstructured":"Bernstein, D.J., Lange, T.: Safecurves: choosing safe curves for elliptic-curve cryptography (2014). \n                    http:\/\/safecurves.cr.yp.to\/"},{"key":"219_CR7","doi-asserted-by":"crossref","unstructured":"Brier, E., Joye, M.: Weierstra\u00df elliptic curves and side-channel attacks. In: Proceedings of 5th International Workshop on Practice and Theory in Public Key Cryptosystems Public Key Cryptography, PKC 2002, Paris, France, February 12\u201314 (2002)","DOI":"10.1007\/3-540-45664-3_24"},{"issue":"6","key":"219_CR8","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B Chevallier-Mames","year":"2004","unstructured":"Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Trans. Comput. 53(6), 760\u2013768 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"219_CR9","unstructured":"Clavier, C., Feix, B., Gagnerot, G., Giraud, C., Roussellet, M., Verneuil, V.: ROSETTA for single trace analysis. In: Proceedings of Progress in Cryptology\u2014INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9\u201312, 2012. pp. 140\u2013155 (2012)"},{"key":"219_CR10","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES\u201999, Worcester, MA, USA, August 12\u201313, 1999, Proceedings, pp. 292\u2013302 (1999)"},{"key":"219_CR11","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"HM Edwards","year":"2007","unstructured":"Edwards, H.M.: A normal form for elliptic curves. Bull. Am. Math. Soc. 44, 393\u2013422 (2007)","journal-title":"Bull. Am. Math. Soc."},{"key":"219_CR12","doi-asserted-by":"crossref","unstructured":"Fan, J., Verbauwhede, I.: An updated survey on secure ECC implementations: attacks, countermeasures and cost. In: Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, pp. 265\u2013282 (2012)","DOI":"10.1007\/978-3-642-28368-0_18"},{"key":"219_CR13","unstructured":"Feix, B., Roussellet, M., Venelli, A.: Side-channel analysis on blinded regular scalar multiplications. In: Progress in Cryptology\u2014INDOCRYPT 2014\u201415th International Conference on Cryptology in India, New Delhi, India, December 14\u201317, 2014, Proceedings, pp. 3\u201320 (2014)"},{"key":"219_CR14","unstructured":"Genkin, D., Shamir, A., Tromer, E.: RSA key extraction via low-bandwidth acoustic cryptanalysis. In: Advances in Cryptology\u2014CRYPTO 2014\u201434th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17\u201321, 2014, Proceedings, Part I, pp. 444\u2013461 (2014)"},{"key":"219_CR15","doi-asserted-by":"crossref","unstructured":"Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6\u20138, 2003, Proceedings, pp. 199\u2013210 (2003)","DOI":"10.1007\/3-540-36288-6_15"},{"key":"219_CR16","unstructured":"Hanley, N., Kim, H.S., Tunstall, M.: Exploiting collisions in addition chain-based exponentiation algorithms using a single trace. In: Topics in Cryptology\u2014CT-RSA 2015, The Cryptographer\u2019s Track at the RSA Conference 2015, San Francisco, CA, USA, April 20\u201324, 2015. Proceedings, pp. 431\u2013448 (2015)"},{"key":"219_CR17","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted Edwards curves revisited. In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7\u201311, 2008. Proceedings, pp. 326\u2013343 (2008)"},{"key":"219_CR18","unstructured":"Itoh, K., Izu, T., Takenaka, M.: Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13\u201315, 2002, Revised Papers, pp. 129\u2013143 (2002)"},{"key":"219_CR19","unstructured":"Itoh, K., Izu, T., Takenaka, M.: A practical countermeasure against address-bit differential power analysis. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2003, 5th International Workshop, Cologne, Germany, September 8\u201310, 2003, Proceedings, pp. 382\u2013396 (2003)"},{"key":"219_CR20","doi-asserted-by":"crossref","unstructured":"Joye, M.: Highly regular right-to-left algorithms for scalar multiplication. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2007, 9th International Workshop, Vienna, Austria, September 10\u201313, 2007, Proceedings, pp. 135\u2013147 (2007)","DOI":"10.1007\/978-3-540-74735-2_10"},{"key":"219_CR21","unstructured":"Joye, M., Yen, S.-M.: The montgomery powering ladder. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13\u201315, 2002, Revised Papers, pp. 291\u2013302 (2002)"},{"key":"219_CR22","unstructured":"Kim, K.H., Lee, C.O., N\u00e8gre, C.: Binary edwards curves revisited. In: Progress in Cryptology\u2014INDOCRYPT 2014\u201415th International Conference on Cryptology in India, New Delhi, India, December 14\u201317, 2014, Proceedings, pp. 393\u2013408 (2014)"},{"key":"219_CR23","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology\u2014CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15\u201319, 1999, Proceedings, pp. 388\u2013397 (1999)"},{"key":"219_CR24","first-page":"100","volume":"2008","author":"P Longa","year":"2008","unstructured":"Longa, P.: Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields. IACR Cryptol. ePrint Arch. 2008, 100 (2008)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"219_CR25","unstructured":"Schramm, K., Wollinger, T.J., Paar, C.: A new class of collision attacks and its application to DES. In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24\u201326, 2003, Revised Papers, pp. 206\u2013222 (2003)"},{"key":"219_CR26","first-page":"291","volume":"2015","author":"T Sugawara","year":"2015","unstructured":"Sugawara, T., Suzuki, D., Saeki, M.: Two operands of multipliers in side-channel attack. IACR Cryptol. ePrint Arch. 2015, 291 (2015)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"219_CR27","doi-asserted-by":"crossref","unstructured":"Walter, C.D.: Sliding windows succumbs to big mac attack. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2001, Third International Workshop, Paris, France, May 14\u201316, 2001, Proceedings, number Generators, pp. 286\u2013299 (2001)","DOI":"10.1007\/3-540-44709-1_24"},{"key":"219_CR28","unstructured":"Wikipedia: Elliptic curve digital signature algorithm. \n                    https:\/\/en.wikipedia.org\/wiki\/Elliptic_Curve_Digital_Signature_Algorithm\n                    \n                  , last edited on 7 March (2019)"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-019-00219-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-019-00219-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-019-00219-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T23:36:58Z","timestamp":1596757018000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-019-00219-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,8]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["219"],"URL":"https:\/\/doi.org\/10.1007\/s13389-019-00219-1","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2019,8,8]]},"assertion":[{"value":"5 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}