{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:34:35Z","timestamp":1762004075534,"version":"3.34.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T00:00:00Z","timestamp":1210809600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s00145-008-9023-0","type":"journal-article","created":{"date-parts":[[2008,5,14]],"date-time":"2008-05-14T17:12:21Z","timestamp":1210785141000},"page":"259-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography"],"prefix":"10.1007","volume":"22","author":[{"given":"M.","family":"Barbosa","sequence":"first","affiliation":[]},{"given":"A.","family":"Moss","sequence":"additional","affiliation":[]},{"given":"D.","family":"Page","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,15]]},"reference":[{"key":"9023_CR1","doi-asserted-by":"crossref","unstructured":"D. Agrawal, B. Archambeault, J.R. Rao, P. Rohatgi, The EM Side-Channel(s). In Cryptographic Hardware and Embedded Systems (CHES), LNCS 2523, 29\u201345, 2002.","DOI":"10.1007\/3-540-36400-5_4"},{"key":"9023_CR2","doi-asserted-by":"crossref","unstructured":"B. Alpern, C.R. Attanasio, J.J. Barton, M.G. Burke, P. Cheng, J.-D. Choi, A. Cocchi, S.J. Fink, D.\u00a0Grove, M. Hind, S.F. Hummel, D. Lieber, V. Litvinov, M.F. Mergen, T. Ngo, J.R. Russell, V. Sarkar, M.J. Serrano, J.C. Shepherd, S.E. Smith, V.C. Sreedhar, H. Srinivasan, J. Whaley, The Jalape\u00f1o Virtual Machine. In IBM System Journal, 39(1), 2000.","DOI":"10.1147\/sj.391.0211"},{"key":"9023_CR3","unstructured":"ARM Limited. Jazelle White Paper. Available from: http:\/\/www.arm.com\/documentation\/ ."},{"key":"9023_CR4","unstructured":"ARM Limited. ARM946E-S Technical Reference Manual. Available from: http:\/\/www.arm.com\/documentation\/ ."},{"key":"9023_CR5","doi-asserted-by":"crossref","unstructured":"M. Arnold, S.J. Fink, D. Grove, M. Hind, P.F. Sweeney, Adaptive Optimization in the Jalape\u00f1o JVM. In Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 2000.","DOI":"10.1145\/353171.353175"},{"key":"9023_CR6","doi-asserted-by":"crossref","unstructured":"R.M. Avanzi, Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. In Cryptographic Hardware and Embedded Systems (CHES), LNCS 3156, 148\u2013162, 2004.","DOI":"10.1007\/978-3-540-28632-5_11"},{"key":"9023_CR7","doi-asserted-by":"crossref","unstructured":"P.D. Barrett, Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In Advances in Cryptology (CRYPTO), LNCS 263, 311\u2013323, 1986.","DOI":"10.1007\/3-540-47721-7_24"},{"key":"9023_CR8","doi-asserted-by":"crossref","unstructured":"M. Barbosa, D. Page, On the Automatic Construction of Indistinguishable Operations. In Cryptology ePrint Archive, Report 2005\/174, 2005.","DOI":"10.1007\/11586821_16"},{"key":"9023_CR9","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I.F. Blake","year":"1999","unstructured":"I.F. Blake, G. Seroussi, N.P. Smart, Elliptic Curves in Cryptography. Cambridge University Press, Cambridge, 1999."},{"key":"9023_CR10","volume-title":"Advances in Elliptic Curve Cryptography","author":"I.F. Blake","year":"2004","unstructured":"I.F. Blake, G. Seroussi, N.P. Smart, Advances in Elliptic Curve Cryptography. Cambridge University Press, Cambridge, 2004."},{"key":"9023_CR11","unstructured":"D. Boneh, D. Brumley, Remote Timing Attacks Are Practical. Available from: http:\/\/crypto.stanford.edu\/~dabo\/papers\/ssl-timing.pdf ."},{"key":"9023_CR12","unstructured":"D.J. Bernstein, Cache-timing Attacks on AES. Available from: http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf ."},{"key":"9023_CR13","doi-asserted-by":"crossref","unstructured":"\u00c9. Brier, M. Joye, Weierstra\u00df Elliptic Curves and Side-channel Attacks. In Public Key Cryptography (PKC), LNCS 2274, 335\u2013345, 2002.","DOI":"10.1007\/3-540-45664-3_24"},{"key":"9023_CR14","unstructured":"J. Camenisch, M. Rohe, A.-R. Sadeghi, Sokrates \u2013 A Compiler Framework for Zero-Knowledge Protocols. In Western European Workshop on Research in Cryptology (WEWoRC), 2005."},{"issue":"6","key":"9023_CR15","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B. Chevallier-Mames","year":"2004","unstructured":"B. Chevallier-Mames, M. Ciet, M. Joye, Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. In IEEE Transactions on Computers, 53(6), 760\u2013768, 2004.","journal-title":"IEEE Transactions on Computers"},{"key":"9023_CR16","doi-asserted-by":"crossref","unstructured":"J.-S. Coron, Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Cryptographic Hardware and Embedded Systems (CHES), LNCS 1717, 292\u2013302, 1999.","DOI":"10.1007\/3-540-48059-5_25"},{"key":"9023_CR17","unstructured":"Computational Algebra Group, University of Sydney. Magma Computational Algebra System. Available from: http:\/\/magma.maths.usyd.edu.au\/magma\/ ."},{"key":"9023_CR18","doi-asserted-by":"crossref","unstructured":"C. Consel, L. Hornof, R. Marlet, G. Muller, S. Thibault, E.-N. Volanschi, J. Lawall, J. Noy\u00e1, Tempo: Specializing Systems Applications and Beyond. In ACM Computing Surveys, 30\u00a0(3), 1998.","DOI":"10.1145\/289121.289140"},{"key":"9023_CR19","unstructured":"P. Crescenzi, V. Kann, A Compendium of NP Optimization Problems. Available from: http:\/\/www.nada.kth.se\/~viggo\/problemlist\/ ."},{"issue":"1","key":"9023_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/0021-9991(90)90201-B","volume":"90","author":"G. Dueck","year":"1990","unstructured":"G. Dueck, T. Scheuer, Threshold Accepting: A General Purpose Optimization Algorithm Appearing Superior to Simulated Annealing. In Journal of Computational Physics, 90(1), 161\u2013175, 1990.","journal-title":"Journal of Computational Physics"},{"key":"9023_CR21","unstructured":"P. Gaudry, E. Thom\u00e9, The mp ${\\mathbb{F}}_{q}$ Library and Implementing Curve-based Key Exchanges. In Software Performance Enhancement for Encryption and Decryption (SPEED), 49\u201364, 2007."},{"key":"9023_CR22","doi-asserted-by":"crossref","unstructured":"D. Gupta, B. Malloy, A. McRae, The Complexity of Scheduling for Data Cache Optimization. In Information Sciences, 100\u00a0(1\u20134), 1997.","DOI":"10.1016\/S0020-0255(96)00273-3"},{"key":"9023_CR23","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"D. Hankerson, A. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography. Springer-Verlag, New York, 2004."},{"key":"9023_CR24","volume-title":"Computer Architecture: A Quantitative Approach","author":"J.L. Hennessy","year":"2006","unstructured":"J.L. Hennessy, D.A. Patterson, Computer Architecture: A Quantitative Approach. Morgan Kaufmann, Los Altos, 2006."},{"key":"9023_CR25","doi-asserted-by":"crossref","unstructured":"M. Joye, J.-J. Quisquater, Hessian Elliptic Curves and Side-Channel Attacks. In Cryptographic Hardware and Embedded Systems (CHES), LNCS 2162, 402\u2013410, 2001.","DOI":"10.1007\/3-540-44709-1_33"},{"key":"9023_CR26","volume-title":"The Art of Computer Programming, Volume 2: Seminumerical Algorithms","author":"D. Knuth","year":"1999","unstructured":"D. Knuth, The Art of Computer Programming, Volume 2: Seminumerical Algorithms. Addison-Wesley, Reading, 1999."},{"key":"9023_CR27","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, Elliptic Curve Cryptosystems. In Mathematics of Computation, 48, 203\u2013209, 1987.","journal-title":"Mathematics of Computation"},{"issue":"3","key":"9023_CR28","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"N. Koblitz, Hyperelliptic Cryptosystems. Journal of Cryptology, 1(3), 139\u2013150, 1989.","journal-title":"Journal of Cryptology"},{"key":"9023_CR29","doi-asserted-by":"crossref","unstructured":"P.C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology (CRYPTO), LNCS 1109, 104\u2013113, 1996.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"9023_CR30","doi-asserted-by":"crossref","unstructured":"P.C. Kocher, J. Jaffe, B. Jun, Differential Power Analysis. In Advances in Cryptology (CRYPTO), LNCS 1666, 388\u2013397, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"9023_CR31","doi-asserted-by":"crossref","unstructured":"M. Kowarschik, C. Wei, An Overview of Cache Optimization Techniques and Cache-Aware Numerical Algorithms. In Algorithms for Memory Hierarchies, LNCS 2625, 213\u2013232, 2003.","DOI":"10.1007\/3-540-36574-5_10"},{"key":"9023_CR32","doi-asserted-by":"crossref","unstructured":"J.R. Lewis, B. Martin, Cryptol: High Assurance, Retargetable Crypto Development and Validation. In Military Communications Conference, 2, 820\u2013825, 2003.","DOI":"10.1109\/MILCOM.2003.1290218"},{"key":"9023_CR33","doi-asserted-by":"crossref","unstructured":"P.-Y. Liardet, N.P. Smart, Preventing SPA\/DPA in ECC Systems Using the Jacobi Form. In Cryptographic Hardware and Embedded Systems (CHES), LNCS 2162, 391\u2013401, 2001.","DOI":"10.1007\/3-540-44709-1_32"},{"key":"9023_CR34","unstructured":"S. Lucks, N. Schmoigl, E.I. Tatli, The Idea and the Architecture of a Cryptographic Compiler. In Western European Workshop on Research in Cryptology (WEWoRC), 2005."},{"key":"9023_CR35","doi-asserted-by":"crossref","unstructured":"S. Micali, L. Reyzin, Physically Observable Cryptography (Extended Abstract). In Theory of Cryptography, LNCS 2951, 278\u2013296, 2004.","DOI":"10.1007\/978-3-540-24638-1_16"},{"key":"9023_CR36","doi-asserted-by":"crossref","unstructured":"V. Miller, Uses of Elliptic Curves in Cryptography. In Advances in Cryptology (CRYPTO), LNCS 218, 417\u2013426, 1985.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"9023_CR37","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"P.L. Montgomery, Modular Multiplication Without Trial Division. Mathematics of Computation, 44, 519\u2013521, 1985.","journal-title":"Mathematics of Computation"},{"key":"9023_CR38","volume-title":"Advanced Compiler Design and Implementation","author":"S.S. Muchnick","year":"1997","unstructured":"S.S. Muchnick, Advanced Compiler Design and Implementation. Morgan Kaufmann, Los Altos, 1997."},{"key":"9023_CR39","doi-asserted-by":"crossref","unstructured":"J.D. Nielsen, M.I. Schwartzbach, A Domain-Specific Programming Language for Secure Multiparty Computation. In Programming Languages and Analysis for Security (PLAS), 2007.","DOI":"10.1145\/1255329.1255333"},{"key":"9023_CR40","unstructured":"D. Page, CAO : A Cryptography Aware Language and Compiler. Available from: http:\/\/www.cs.bris.ac.uk\/home\/page\/research\/cao.html ."},{"key":"9023_CR41","doi-asserted-by":"crossref","unstructured":"J. Sermulins, W. Thies, R. Rabbah, S. Amarasinghe, Cache Aware Optimization of Stream Programs. In ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, 2005.","DOI":"10.1145\/1065910.1065927"},{"key":"9023_CR42","unstructured":"Standards for Efficient Cryptography Group (SECG). SEC 2: Recommended Elliptic Curve Domain Parameters, 2000. Available from: http:\/\/www.secg.org ."},{"key":"9023_CR43","unstructured":"V. Shoup, NTL: A Library for doing Number Theory. Available from: http:\/\/www.shoup.net\/ntl\/ ."},{"key":"9023_CR44","unstructured":"J.A. Solinas, Generalized Mersenne Numbers. Technical Report CORR 99-39, University of Waterloo, 1999."},{"key":"9023_CR45","doi-asserted-by":"crossref","unstructured":"E. Trichina, A. Bellezza, Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. In Cryptographic Hardware and Embedded Systems (CHES), LNCS 2523, 98\u2013113, 2002.","DOI":"10.1007\/3-540-36400-5_9"},{"key":"9023_CR46","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1049\/el:19991230","volume":"35","author":"C.D. Walter","year":"1999","unstructured":"C.D. Walter, Montgomery Exponentiation Needs No Final Subtractions. Electronics Letters, 35, 1831\u20131832, 1999.","journal-title":"Electronics Letters"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-008-9023-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-008-9023-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-008-9023-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-008-9023-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T08:16:46Z","timestamp":1738225006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-008-9023-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,15]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["9023"],"URL":"https:\/\/doi.org\/10.1007\/s00145-008-9023-0","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"type":"print","value":"0933-2790"},{"type":"electronic","value":"1432-1378"}],"subject":[],"published":{"date-parts":[[2008,5,15]]},"assertion":[{"value":"27 February 2007","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2008","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2008","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}