{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:43:45Z","timestamp":1729622625685,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/ipdps.2007.370380","type":"proceedings-article","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T14:41:07Z","timestamp":1182350467000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["A Cryptographic Coarse Grain Reconfigurable Architecture Robust Against DPA"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Mesquita","sequence":"first","affiliation":[]},{"given":"Benoit","family":"Badrignans","sequence":"additional","affiliation":[]},{"given":"Lionel","family":"Torres","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Sassatelli","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Robert","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Moraes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"104","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","author":"kocher","year":"1996","journal-title":"16th Workshop in Cryptology Crypto '96"},{"key":"17","first-page":"199","article-title":"A refined power-analysis attack on ECC","author":"goubin","year":"2003","journal-title":"Publick Key Cryptography PKC '03"},{"key":"18","first-page":"343","article-title":"Efficient Countermeasures against RPA, DPA, and SPA","author":"hideyo","year":"2004","journal-title":"Cryptographic Hardware and Embedded SystemsProc CHES '05"},{"year":"0","key":"33"},{"key":"15","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems","volume":"21","author":"rivest","year":"1978","journal-title":"ACM Communications"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1145\/4372.4373"},{"key":"13","first-page":"71","article-title":"Protecting smart cards from passive power analysis with detached power supplies","author":"shamir","year":"2000","journal-title":"Cryptographic Hardware and Embedded SystemsProc CHES '05"},{"key":"14","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","article-title":"Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems","author":"coron","year":"1999","journal-title":"Cryptographic Hardware and Embedded Systems CHES'99"},{"key":"11","first-page":"222","article-title":"Hardware countermeasures against DPA - a statistical analysis of their effectiveness","author":"mangard","year":"2004","journal-title":"Topics in Cryptology - CT-RSA"},{"key":"12","article-title":"Current Mask Generation: A New Hardware Countermeasure for Masking Signatures of Cryptographic Cores","author":"mesquita","year":"2005","journal-title":"International Conference on VLSI IFIP VLSI SoC '05"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/TEC.1959.5219515"},{"key":"20","first-page":"228","article-title":"A DPA Attack against the Modular Reduction within a CRT Implementation of RSA","author":"boer","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems CHES'02"},{"key":"22","first-page":"62","article-title":"Leak Resistant Arithmetic","author":"bajard","year":"2004","journal-title":"Cryptographic Hardware and Embedded SystemsProc CHES '05"},{"key":"23","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/11557654_64","article-title":"A CRT-Based RSA Countermeasure against Physical Cryptanalysis","author":"kim","year":"2005","journal-title":"Conference on High Performance Computing and Communications HPCC '05"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/TC.2004.2"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/MWSCAS.2003.1562409"},{"key":"26","article-title":"Reconfiguration Control for Dynamically Reconfigurable Systems","author":"carvalho","year":"2004","journal-title":"Conference on Design of Circuits and Integrated Systems DCIS '04"},{"year":"0","key":"27"},{"key":"28","article-title":"Fast montgomery modular multiplication and RSA cryptographic processor architectures","author":"mcivor","year":"2003","journal-title":"Proc Conf Asilomar"},{"year":"0","key":"29"},{"key":"3","first-page":"286","article-title":"Sliding Windows Succumbs to Big Mac Attack","author":"walter","year":"2001","journal-title":"Cryptographic Hardware and Embedded SystemsProc CHES '05"},{"year":"0","key":"2"},{"key":"10","article-title":"Non-deterministic processors","author":"may","year":"2001","journal-title":"Information security and privacy - ACISP '01"},{"key":"1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis : Leaking Secrets","author":"kocher","year":"1999","journal-title":"Advances in Cryptology ? CRYPTO? 99"},{"key":"30","first-page":"111","article-title":"A review of modular multiplication methods and respective hardware implementations","volume":"30","author":"nedjah","year":"2006","journal-title":"Informatica"},{"key":"7","first-page":"421","article-title":"Balanced Self-Checking Asynchronous Logic for Smart Card Applications","author":"simon","year":"2003","journal-title":"Microprocess Microsyst"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/DATE.2003.1253591"},{"key":"32","first-page":"107","article-title":"Fpga implementation of modular multipliers","author":"deschamps","year":"2002","journal-title":"Proceedings of the DCIS '02"},{"key":"5","article-title":"Asynchronous Dual rail Cells to Secure Cryptosystem Against SCA","author":"razafindraibe","year":"2005","journal-title":"Proc Sophia Antipolis Forum MicroElectronics"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1145\/503053.503055"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/775844.775845"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ASAP.2002.1030727"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/3-540-44499-8_20"}],"event":{"name":"2007 IEEE International Parallel and Distributed Processing Symposium","start":{"date-parts":[[2007,3,26]]},"location":"Long Beach, CA, USA","end":{"date-parts":[[2007,3,30]]}},"container-title":["2007 IEEE International Parallel and Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4203121\/4227918\/04228108.pdf?arnumber=4228108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T18:53:54Z","timestamp":1497725634000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4228108\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2007.370380","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}