{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:46:36Z","timestamp":1767084396375},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/dtis.2018.8368560","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T18:25:11Z","timestamp":1527791111000},"page":"1-4","source":"Crossref","is-referenced-by-count":6,"title":["Unified field multiplier for ECC: Inherent resistance against horizontal SCA attacks"],"prefix":"10.1109","author":[{"given":"Ievgen","family":"Kabin","sequence":"first","affiliation":[]},{"given":"Zoya","family":"Dyka","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Kreiser","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Langendoerfer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_28"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.13"},{"journal-title":"Digital Signature Standard Request for Comments on the NIST-Recommended Elliptic Curves","year":"2015","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89500-0_20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RECONFIG.2017.8279800"},{"key":"ref8","first-page":"167","article-title":"Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization","author":"bock","year":"0","journal-title":"SecITC 2016"},{"key":"ref7","first-page":"316","article-title":"Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation","author":"l\u00f3pez","year":"1999","journal-title":"CHES"},{"key":"ref2","first-page":"292","article-title":"Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems","author":"coron","year":"0","journal-title":"CHES 1999"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.67"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17650-0_5"}],"event":{"name":"2018 13th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","start":{"date-parts":[[2018,4,9]]},"location":"Taormina","end":{"date-parts":[[2018,4,12]]}},"container-title":["2018 13th International Conference on Design &amp; Technology of Integrated Systems In Nanoscale Era (DTIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8362838\/8368541\/08368560.pdf?arnumber=8368560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T19:34:06Z","timestamp":1529350446000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8368560\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/dtis.2018.8368560","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}