{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:18:55Z","timestamp":1729621135158,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856673","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"87-91","source":"Crossref","is-referenced-by-count":2,"title":["Towards secure communications: Review of side channel attacks and countermeasures on ECC"],"prefix":"10.1109","author":[{"given":"Lo'ai A.","family":"Tawalbeh","sequence":"first","affiliation":[]},{"given":"Turki F.","family":"Somani","sequence":"additional","affiliation":[]},{"given":"Hilal","family":"Houssain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011214926272"},{"key":"ref32","first-page":"14","article-title":"Template attacks on ECDSA","volume":"5379","author":"medwed","year":"2008","journal-title":"Proc 9th IEEE Int Workshop MEMS"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13039-2_2"},{"key":"ref30","first-page":"13","article-title":"Template Attacks","volume":"2523","author":"suresh","year":"2002","journal-title":"Proc 4th International Workshop Redwood Shores"},{"key":"ref35","first-page":"257","article-title":"Projective Coordinates Leak","volume":"3027","author":"david","year":"2004","journal-title":"Proc International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2010.2103190"},{"key":"ref10","article-title":"Handbook of Wireless Security: From Specifications to Implementations","author":"sklavos","year":"2007","journal-title":"CRC Press Taylor & Francis Group"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"article-title":"A novel unified algorithm and hardware architecture for integrated modular division and multiplication in gf (p) and gf (2n) suitable for public-key cryptography","year":"2004","author":"lo'ai ali","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44828-4_5"},{"key":"ref14","first-page":"471","article-title":"Efficient Solution to Secure ECC Against Side-channel Attacks","volume":"20","author":"wu","year":"2011","journal-title":"Chinese Journal of Electronics"},{"key":"ref15","first-page":"391","article-title":"Preventing SPA\/DPA in ECC Systems Using the Jacobi Form","volume":"2162","author":"liardet","year":"2001","journal-title":"Proc Third Int l Workshop"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45811-5_31"},{"key":"ref17","first-page":"335","article-title":"WeierstraB elliptic curves and side-channel attacks","author":"eric","year":"2002","journal-title":"Workshop on Public Key Cryptography"},{"key":"ref18","article-title":"An efficient hardware architecture of a scalable elliptic curve crypto-processor over GF(2n)","author":"tawalbeh","year":"2005","journal-title":"Proc SPIE 5910 Advanced Signal Processing Algorithms Architectures and Implementations XV Q"},{"article-title":"Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields","year":"2007","author":"longa","key":"ref19"},{"key":"ref28","first-page":"117","article-title":"Relative Doubling Attack Against Montgomery Ladder","volume":"3935","author":"yen","year":"2005","journal-title":"Proc 8th Int Conf"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Proceedings of Advances in Cryptology CRYPTO'99"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_22"},{"key":"ref3","article-title":"Hardware Implementations of Secure Hashing Functions on FPGAs for WSNs","author":"moh'd","year":"2010","journal-title":"Proceedings of the 3rd International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)"},{"key":"ref6","article-title":"Exact analysis of Montgomery multiplication","author":"sato","year":"2004","journal-title":"Proc Indocrypt06 LNCS"},{"key":"ref29","first-page":"16","article-title":"Correlation Power Analysis with a Leakage Model","volume":"3156","author":"brier","year":"2004","journal-title":"Proc 6th Int Workshop RTN"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0147"},{"key":"ref8","first-page":"292","article-title":"Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems","volume":"1717","author":"coron","year":"2002","journal-title":"Proc First International Workshop CHES'99 Worcester"},{"key":"ref7","article-title":"Enhanced FPGA implementations for doubling oriented and Jacobi-quartics elliptic curves cryptography","author":"lo'ai","year":"2011","journal-title":"Journal of Information Assurance and Security Dynamic Publishers"},{"key":"ref2","first-page":"70","article-title":"Large scale cloudlets deployment for efficient mobile cloud computing","volume":"10","author":"lo'ai","year":"2015","journal-title":"Journal of Networks"},{"key":"ref9","article-title":"An Integrated Radix-4 Modular Divider\/Multiplier Hardware Architecture for Cryptographic Applications","volume":"9","author":"tawalbeh","year":"2012","journal-title":"Int Arab J Inf Technol"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.150"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_7"},{"article-title":"Cryptographic, Security: Countermeasures against Side-Channel Attacks","year":"2014","author":"ma","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.13"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_28"},{"key":"ref23","first-page":"191","article-title":"Simple power analysis of unified code for (ECC) double and add","volume":"3156","author":"walter","year":"2004","journal-title":"Proc of 6th International Workshop Cambridge"},{"key":"ref26","first-page":"218","article-title":"Zero-Value Point Attacks on Elliptic Curve Cryptosystem","volume":"2851","author":"akishita","year":"2003","journal-title":"Proc 6th International Conference"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_15"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856673.pdf?arnumber=7856673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:53:13Z","timestamp":1568836393000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856673\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856673","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}