{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:03:46Z","timestamp":1729616626355,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iccitechnology.2013.6579518","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:36Z","timestamp":1377709896000},"page":"33-38","source":"Crossref","is-referenced-by-count":1,"title":["An efficiently secure ECC scalar multiplication method against Power Analysis Attacks on resource constrained devices"],"prefix":"10.1109","author":[{"given":"Hilal","family":"Houssain","sequence":"first","affiliation":[]},{"given":"Turki F.","family":"Al-Somani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"335","article-title":"Weierstra\ufffd elliptic curves and side-channel attacks","author":"brier","year":"2002","journal-title":"David Naccache and Pascal Paillier (Eds ) Public Key Cryptography Vol 2274 of Lecture Notes in Computer Science"},{"key":"17","first-page":"402","article-title":"Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks","volume":"2433","author":"mo?ller","year":"2002","journal-title":"Int Conf on Information Security (ISC 2002) Sao Paulo Brazil"},{"key":"18","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/3-540-44709-1_32","article-title":"Preventing spa\/dpa in ecc systems using the jacobi form","volume":"2162","author":"np","year":"2001","journal-title":"Cryptographic Hardware and Embedded System (CHES) 2001"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/E88-A.1.132"},{"key":"16","first-page":"269","article-title":"The doubling attack-why upwards is better than downwards","volume":"2779","author":"fouque","year":"2003","journal-title":"Proc CHES'03"},{"key":"13","first-page":"348","article-title":"(Virtually) free randomization techniques for elliptic curve cryptography","author":"ciet","year":"2003","journal-title":"Information and Communications Security (ICICS2006) LNCS 2836"},{"key":"14","first-page":"292","article-title":"Resistance against differential power analysis for elliptic curve cryptosystems","volume":"1717","author":"coron","year":"1999","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 1999"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.26"},{"key":"12","first-page":"199","article-title":"A refined power-analysis attack on elliptic curve cryptosystems","author":"goubin","year":"2003","journal-title":"Proceedings of PKC 2003 LNCS 2567"},{"key":"21","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-44709-1_33","article-title":"Hessian elliptic curves and side-channel attacks","author":"joye","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2001 LNCS 2162 Springer-Verlag"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"22","first-page":"34","article-title":"The jacobi model of an elliptic curve and side-channel analysis","author":"billet","year":"2003","journal-title":"Applied Algebra Algebraic Algorithms and Error-Correcting Codes 2003 LNCS 2643 Springer-Verlag"},{"key":"23","first-page":"471","volume":"20","author":"keke","year":"2011","journal-title":"Efficient Solution to Secure ECC Against Side-channel Attacks"},{"key":"24","article-title":"Unified paddition formul\ufffd for elliptic curve cryptosystems","author":"brier","year":"2004","journal-title":"Embedded Cryptographic Hardware Methodologies and Architectures"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2008.4587.4594"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2010.2103190"},{"key":"27","first-page":"342","article-title":"A comb method to render ecc resistant against side channel attacks","author":"hedabou","year":"2004","journal-title":"IACR Cryptology EPrint Archive 2004"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_31"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"10","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Proc Adv Cryptology-CRYPTO'99 Santa Barbara CA"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"7"},{"key":"6","first-page":"119","article-title":"Comparing elliptic curve cryptography and rsa on 8-bit cpus","author":"gura","year":"2004","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2004 Vol 3156 of Lecture Notes in Computer Science"},{"key":"5","first-page":"1","article-title":"Hardware implementations of elliptic curve cryptography in wireless sensor networks","author":"houssain","year":"2011","journal-title":"Proc 6th International Conf on Internet Technology and Secured Transactions (ICITST 2011) Abu Dhabi UAE"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"9","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems","author":"kocher","year":"1996","journal-title":"Advances in Cryptology Proc CRYPTO '96"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0913"}],"event":{"name":"2013 International Conference on Communications and Information Technology (ICCIT)","start":{"date-parts":[[2013,6,19]]},"location":"Beirut, Lebanon","end":{"date-parts":[[2013,6,21]]}},"container-title":["2013 Third International Conference on Communications and Information Technology (ICCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573243\/6579508\/06579518.pdf?arnumber=6579518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:53:13Z","timestamp":1498063993000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6579518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iccitechnology.2013.6579518","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}