{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:53:40Z","timestamp":1774367620687,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/reconfig.2017.8279800","type":"proceedings-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T17:32:24Z","timestamp":1517851944000},"page":"1-8","source":"Crossref","is-referenced-by-count":26,"title":["Horizontal address-bit DPA against montgomery kP implementation"],"prefix":"10.1109","author":[{"given":"Ievgen","family":"Kabin","sequence":"first","affiliation":[]},{"given":"Zoya","family":"Dyka","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Kreiser","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Langendoerfer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","year":"0","journal-title":"The Elliptic Curve Digital Signature Algorithm (ECDSA)"},{"key":"ref31","year":"0","journal-title":"Current Probe"},{"key":"ref30","article-title":"Xilinx Inc","year":"2011","journal-title":"Spartan-6 Family Overview Product Specification DS 160 (v2 0)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_27"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_15"},{"key":"ref13","first-page":"150","article-title":"Securing the AES Finalists Against Power Analysis Attacks","author":"messerges","year":"2000","journal-title":"Fast Software Encryption"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2009.5377676"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-3485-4_19"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_22"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2015.40"},{"key":"ref19","first-page":"16","article-title":"Correlation Power Analysis with a Leakage Model","author":"brier","year":"2004","journal-title":"Cryptographic Hardware and Embedded Systems - CHES"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47238-6_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_14"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44499-8_1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASYNC.2002.1000311"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_25"},{"key":"ref29","article-title":"Federal Information Processing Standard (FIPS) 186&#x2013;4","year":"2015","journal-title":"Digital Signature Standard Request for Comments on the NIST-Recommended Elliptic Curves"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_24"},{"key":"ref2","first-page":"403","article-title":"A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards","volume":"406","author":"tiri","year":"2002","journal-title":"Proceedings of the 28th European Solid-State Circuits Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_7"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","author":"kocher","year":"1999","journal-title":"Differential Power Analysis In Advances in Cryptology - CRYPTO&#x2019; 99"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_22"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_24"},{"key":"ref24","first-page":"553","article-title":"Horizontal Collision Correlation Attack on Elliptic Curves","author":"bauer","year":"2013","journal-title":"ACM Selected Areas in Cryptography SAC"},{"key":"ref23","first-page":"46","article-title":"Horizontal correlation analysis on exponentiation","volume":"6476","author":"bauer","year":"2010","journal-title":"ICICS"},{"key":"ref26","first-page":"129","article-title":"Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA","author":"itoh","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems - CHES"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_15"}],"event":{"name":"2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","location":"Cancun","start":{"date-parts":[[2017,12,4]]},"end":{"date-parts":[[2017,12,6]]}},"container-title":["2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8268902\/8279767\/08279800.pdf?arnumber=8279800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T05:09:10Z","timestamp":1570684150000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8279800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2017.8279800","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}