{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:43:14Z","timestamp":1752669794494},"reference-count":33,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,7,2]]},"DOI":"10.1080\/10798587.2015.1118909","type":"journal-article","created":{"date-parts":[[2016,2,25]],"date-time":"2016-02-25T04:23:49Z","timestamp":1456374229000},"page":"353-363","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation"],"prefix":"10.32604","volume":"22","author":[{"given":"Yongje","family":"Choi","sequence":"first","affiliation":[]},{"given":"Dooho","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Hoonjae","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jaecheol","family":"Ha","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,2,24]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04159-4_22"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.12"},{"key":"CIT0003","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/3-540-36400-5_20","volume":"2523","author":"Aum\u00fcller C.","year":"2002","journal-title":"Proc. of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES \u201802), LNCS"},{"key":"CIT0004","first-page":"331","author":"Bl\u00f6mer J.","year":"2007","journal-title":"Proc. of the 10th ACM Conference on Computer and Communications Security (CCS\u201903)"},{"key":"CIT0005","first-page":"11","author":"Boneh D.","year":"1997","journal-title":"Proc. of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT \u201897), LNCS 1233"},{"key":"CIT0006","first-page":"237","volume":"4462","author":"Boscher A.","year":"2007","journal-title":"Proc. of the International Workshop on Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems (WISTP \u201807), LNCS"},{"key":"CIT0007","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume":"3156","author":"Brier E.","year":"2004","journal-title":"Proc. of the 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES \u201804), LNCS"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.13"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40026-1_6"},{"key":"CIT0010","first-page":"40","author":"Clavier C.","year":"2011","journal-title":"Proc. of the 12th International Conference on Cryptology in India (INDOCRYPT \u201811), LNCS 7107"},{"key":"CIT0011","first-page":"46","author":"Clavier C.","year":"2010","journal-title":"Proc. of the 12th International Conference on Information and Communications Security (ICICS \u201910), LNCS 6476"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_25"},{"key":"CIT0013","first-page":"65","author":"Courrege J.","year":"2010","journal-title":"Proc. of the 9th International Conference on Smart Card Research and Advanced Application(CRDIS \u201810), LNCS 6035"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1049\/el:19820617"},{"key":"CIT0015","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/978-3-540-45238-6_22","volume":"2779","author":"Fouque P.","year":"2003","journal-title":"Proc. of the 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES \u201803), LNCS"},{"key":"CIT0016","first-page":"142","author":"Giraud C.","year":"2005","journal-title":"Proc. of the 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC\u201905)"},{"key":"CIT0017","first-page":"38","volume":"4","author":"Ha J.","year":"2014","journal-title":"Journal of Internet Services and Information Security"},{"key":"CIT0018","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1007\/978-3-642-05445-7_22","volume":"5867","author":"Joye M.","year":"2009","journal-title":"Proc. of the 16th Annual International Workshop on Selected Areas in Cryptography (SAC \u201809), LNCS"},{"key":"CIT0019","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume":"2523","author":"Joye M.","year":"2002","journal-title":"Proc. of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES \u201802), LNCS"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72354-7_18"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.11"},{"key":"CIT0022","first-page":"388","volume":"1666","author":"Kocher P.","year":"1999","journal-title":"Proc. of the 19th International Cryptology Conference (CRYPTO \u201899), LNCS"},{"key":"CIT0023","author":"Lenstra A.","year":"1996","journal-title":"Memo on RSA signature generation in the presence of faults"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_14"},{"key":"CIT0025","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/FDTC.2014.17","author":"Rauzy P.","year":"2014","journal-title":"Proc. of the 11th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC\u201914)"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"CIT0027","author":"Shamir A.","year":"1999","journal-title":"Method and apparatus for protecting public key schemes from timing and fault attack"},{"key":"CIT0028","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/3-540-44709-1_24","volume":"2162","author":"Walter C.","year":"2001","journal-title":"Proc. of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES \u201801), LNCS"},{"key":"CIT0029","first-page":"77","volume":"6558","author":"Witteman M.","year":"2011","journal-title":"Proc. of the Cryptographers\u2019 Track at the RSA Conference (CT-RSA \u201811), LNCS"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1109\/12.869328"},{"key":"CIT0031","first-page":"414","author":"Yen S.","year":"2002","journal-title":"Proc. of the 4th International Conference on Information Security and Cryptology (ICISC \u201801), LNCS 2288"},{"key":"CIT0032","first-page":"117","author":"Yen S.","year":"2005","journal-title":"Proc. of the 8th International Conference on Information Security and Cryptology (ICISC\u201905), LNCS 3935"},{"key":"CIT0033","first-page":"183","author":"Yen S.","year":"2005","journal-title":"Proc. of the 1st International Conference on Cryptology in Malaysia (Mycrypt \u201805), LNCS 3715"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1118909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T02:04:48Z","timestamp":1600221888000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1118909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,24]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,12,21]]},"published-print":{"date-parts":[[2016,7,2]]}},"alternative-id":["10.1080\/10798587.2015.1118909"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2015.1118909","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,24]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}