{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:11:09Z","timestamp":1729627869615,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/aiccsa.2008.4493630","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T17:37:07Z","timestamp":1209404227000},"page":"860-865","source":"Crossref","is-referenced-by-count":0,"title":["An efficient high performance scalar multiplication method with resistance against timing attacks"],"prefix":"10.1109","author":[{"given":"Turki F.","family":"Al-Somani","sequence":"first","affiliation":[]},{"given":"Alaaeldin","family":"Amin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"journal-title":"Cache-timing attacks on AES","year":"0","author":"bernstein","key":"17"},{"journal-title":"Investigation of cache timing attacks on AES","year":"2005","author":"o'hanlan","key":"18"},{"year":"0","key":"33"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1524\/strm.2002.20.14.191"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"},{"journal-title":"Timing Attacks for Cryptosystems Based on Elliptic Curves","year":"2002","author":"schepers","key":"13"},{"key":"14","first-page":"263","article-title":"a combined timing and power attack","volume":"2274","author":"schindler","year":"2002","journal-title":"LNCS"},{"article-title":"unleashing the full power of timing attack","year":"2001","author":"schindler","key":"11"},{"year":"0","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_16"},{"key":"20","article-title":"a timing attack on the ciks-i block cipher","author":"furlong","year":"2005","journal-title":"Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.13"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.32"},{"key":"24","article-title":"high performance elliptic curve gf(2 m) cryptoprocessor secure against timing attacks","volume":"6","author":"al-somani","year":"2006","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"25","first-page":"292","article-title":"resistance against differential power analysis for elliptic curve cryptosystems","volume":"1717","author":"coron","year":"1999","journal-title":"LNCS"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-1983-2","author":"mceliece","year":"1987","journal-title":"Finite Fields for Computer Scientists and Engineers"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139172769"},{"year":"0","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0913"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"year":"0","key":"30"},{"article-title":"a timing attack against rijndael","year":"1999","author":"koeune","key":"7"},{"year":"0","key":"6"},{"article-title":"'computational method and apparatus for finite field arithmetic'","year":"1986","author":"omura","key":"32"},{"key":"5","first-page":"104","article-title":"timing attacks on implementations of diffe-hellman, rsa, dss, and other systems","volume":"1109","author":"kocher","year":"1996","journal-title":"LNCS"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2006.742.748"},{"key":"4","first-page":"388","article-title":"differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"LNCS"},{"key":"9","first-page":"292","article-title":"resistance against differential power analysis for elliptic curve cryptosystems","volume":"1717","author":"coron","year":"1999","journal-title":"LNCS"},{"year":"0","key":"8"}],"event":{"name":"2008 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2008,3,31]]},"location":"Doha, Qatar","end":{"date-parts":[[2008,4,4]]}},"container-title":["2008 IEEE\/ACS International Conference on Computer Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4488216\/4493499\/04493630.pdf?arnumber=4493630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:31:00Z","timestamp":1497771060000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4493630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2008.4493630","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}