{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:48:36Z","timestamp":1725508116953},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/reconfig.2018.8641730","type":"proceedings-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T18:39:16Z","timestamp":1550169556000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA"],"prefix":"10.1109","author":[{"given":"Zoya","family":"Dyka","sequence":"first","affiliation":[]},{"given":"Dan","family":"Kreiser","sequence":"additional","affiliation":[]},{"given":"Ievgen","family":"Kabin","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Langendoerfer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"231","article-title":"Localized Electromagnetic Analysis of Cryptographic Implementations","author":"heyszl","year":"0","journal-title":"Topics in Cryptology &#x2013; CT-RSA 2012"},{"key":"ref11","first-page":"46","author":"clavier","year":"0","journal-title":"Horizontal correlation analysis on exponentiation ICICS 2010"},{"key":"ref12","first-page":"1","article-title":"Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations","author":"bauer","year":"0","journal-title":"Topics in Cryptology &#x2013; CT-RSA 2013"},{"key":"ref13","first-page":"553","article-title":"Horizontal Collision Correlation Attack on Elliptic Curves","author":"bauer","year":"0","journal-title":"SAC 2013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/RECONFIG.2017.8279800"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328695"},{"key":"ref16","first-page":"292","author":"coron","year":"0","journal-title":"Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems CHES 1999"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref18","first-page":"1","author":"hankerson","year":"2000","journal-title":"Cryptographic Hardware and Embedded Systems &#x2014; CHES 2000"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47238-6_12"},{"key":"ref4","first-page":"144","author":"messerges","year":"0","journal-title":"Power Analysis Attacks of Modular Exponentiation in Smartcards CHES 1999"},{"key":"ref3","first-page":"269","author":"fouque","year":"2779","journal-title":"The Doubling Attack &#x2013; Why Upwards Is Better than Downwards CHES 2003"},{"key":"ref6","first-page":"16","article-title":"Correlation Power Analysis with a Leakage Model","author":"brier","year":"2004","journal-title":"Proc of CHES"},{"key":"ref5","first-page":"388","article-title":"Differential Power Analysis","author":"kocher","year":"0","journal-title":"Advances in cryptology &#x2014; CRYPTO'99"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EURCON.2005.1630348"},{"key":"ref7","first-page":"1","article-title":"Simple power analysis attack against elliptic curve cryptography processor on FPGA implementation","author":"kadir","year":"2011","journal-title":"Proc ICEEI"},{"key":"ref2","first-page":"15","author":"homma","year":"0","journal-title":"Collision-based Power Analysis of Modular Exponentiation Using Chosen-message CHES 2008"},{"key":"ref9","first-page":"286","article-title":"Sliding Windows Succumbs to Big Mac Attack","author":"walter","year":"2001","journal-title":"Proc CHES"},{"journal-title":"Digital Signature Standard Request for Comments on the NIST-Recommended Elliptic Curves","year":"2015","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.67"},{"journal-title":"Riscure Inspector data sheet Current Probe","year":"0","key":"ref22"},{"journal-title":"Spartan-6 Family Overview Product Specification DS 160 (v2 0)","year":"2011","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.13"},{"journal-title":"MFA02 micro probe set","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2009.5377676"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS.2018.8368560"}],"event":{"name":"2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","start":{"date-parts":[[2018,12,3]]},"location":"Cancun, Mexico","end":{"date-parts":[[2018,12,5]]}},"container-title":["2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8637084\/8641689\/08641730.pdf?arnumber=8641730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:16:52Z","timestamp":1643253412000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8641730\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2018.8641730","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}