{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:38:45Z","timestamp":1729636725273,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/icdsp.2013.6622717","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T17:46:58Z","timestamp":1382032018000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["All bits cross correlation attack on the Montgomery Ladder implementation of RSA"],"prefix":"10.1109","author":[{"given":"Ebru","family":"Akalp Kuzu","sequence":"first","affiliation":[]},{"given":"Ali","family":"Tangel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"300","article-title":"Universal exponentiation algorithm: A first step towards provable SPA-resistance","author":"clavier","year":"2001","journal-title":"CHES '01 LNCS 2162"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.135"},{"key":"15","first-page":"280","article-title":"A fast parallel elliptic curve multiplication resistant against side channel attacks","author":"izu","year":"2002","journal-title":"PKC'02 LNCS 2274"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39927-8_32"},{"key":"13","first-page":"291","article-title":"The montgomery powering ladder","volume":"2523","author":"joye","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_22"},{"key":"12","first-page":"414","article-title":"A countermeasure against one physical cryptanalysis may benefit another attack","volume":"2288","author":"yen","year":"2002","journal-title":"Proceedings of Information Security and Cryptology"},{"key":"3","first-page":"151","article-title":"Investigations of power analysis attacks on smartcards","author":"messerges","year":"1999","journal-title":"Proceedings of USENIX Workshop on Smartcard Technology"},{"journal-title":"Introduction to Differential Power Analygsis and Related Attacks","year":"1998","author":"kocher","key":"2"},{"key":"1","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, RSA, DSS, and other system","author":"kocher","year":"1996","journal-title":"Advanced in Cryptology CRYPTO 96 LNCS 1109"},{"key":"10","first-page":"292","article-title":"Resistance against differential power analysis for elliptic curve cryptosystems","author":"coron","year":"1999","journal-title":"CHES'99 LNCS 1717"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.0109.0249"},{"key":"6","first-page":"144","article-title":"Power analysis attacks of modula exponentiation in smartcards","author":"messerges","year":"1999","journal-title":"CHES'99 LNCS 1717"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77360-3_8"},{"key":"4","first-page":"16","article-title":"Correlation power analysis with a leakage model","volume":"3156","author":"brier","year":"2004","journal-title":"CHES 2004 LNCS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514209"},{"key":"8","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-3-642-19074-2_6","article-title":"Defeating RSA multiply-always and message blinding countermeasures","volume":"6558","author":"witteman","year":"2011","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2013 18th International Conference on Digital Signal Processing (DSP)","start":{"date-parts":[[2013,7,1]]},"location":"Fira, Santorini, Greece","end":{"date-parts":[[2013,7,3]]}},"container-title":["2013 18th International Conference on Digital Signal Processing (DSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6599036\/6622665\/06622717.pdf?arnumber=6622717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T20:05:50Z","timestamp":1498075550000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6622717\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icdsp.2013.6622717","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}