{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:19:12Z","timestamp":1730305152032,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/wd.2008.4812882","type":"proceedings-article","created":{"date-parts":[[2009,4,10]],"date-time":"2009-04-10T19:39:42Z","timestamp":1239392382000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["An efficient algorithm resistant to SPA and DPA variants in ECC"],"prefix":"10.1109","author":[{"given":"Hadi","family":"Meshgi","sequence":"first","affiliation":[]},{"given":"Mohammad Erfan","family":"Khazaee","sequence":"additional","affiliation":[]},{"given":"Behzad","family":"Kasiri","sequence":"additional","affiliation":[]},{"given":"Hadi Shahriar","family":"Shahhoseini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/ICACT.2008.4493939"},{"year":"0","key":"13"},{"key":"14","first-page":"343","article-title":"efficient countermeasure against rpa, dpa, and spa","volume":"3156","author":"mamiya","year":"2004","journal-title":"LNCS"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1016\/j.ins.2006.12.016"},{"key":"12","first-page":"300","article-title":"universal exponentiation algorithm - a first step towards provable spa-resistance","volume":"2162","author":"clavier","year":"2001","journal-title":"LNCS"},{"year":"0","key":"3"},{"key":"2","first-page":"388","article-title":"differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"LNCS"},{"key":"1","first-page":"104","article-title":"timing attacks on implementations of diffie-hellman, rsa, dss, and other system","volume":"1109","author":"kocher","year":"1996","journal-title":"LNCS"},{"year":"2004","author":"hankerson","journal-title":"Guide to Elliptic Curve Cryptography","key":"10"},{"key":"7","first-page":"218","article-title":"zero-value point attacks on elliptic curve cryptosystem","volume":"2851","author":"akishita","year":"2003","journal-title":"LNCS"},{"key":"6","first-page":"199","article-title":"a refined power-analysis attack on elliptic curvecryptosystems","volume":"2567","author":"goubin","year":"2003","journal-title":"Public Key Cryptography-PKC2003LNCS"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1093\/ietfec\/E88-A.1.161"},{"key":"4","first-page":"324","article-title":"securing elliptic curve point multiplication against sidechannel attacks","volume":"2200","author":"muoller","year":"2001","journal-title":"LNCS"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/3-540-39799-X_31"},{"key":"8","first-page":"269","article-title":"the doubling attack-why upwards is better than downwards","volume":"2779","author":"fouque","year":"2003","journal-title":"LNCS"}],"event":{"name":"2008 1st IFIP Wireless Days (WD)","start":{"date-parts":[[2008,11,24]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2008,11,27]]}},"container-title":["2008 1st IFIP Wireless Days"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4808202\/4812823\/04812882.pdf?arnumber=4812882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T18:59:09Z","timestamp":1489777149000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4812882\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wd.2008.4812882","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}