{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:12:50Z","timestamp":1750306370936,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2898420.2901921","type":"proceedings-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T22:58:31Z","timestamp":1464130711000},"page":"21-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved Atomicity to Prevent HCCA on NIST Curves"],"prefix":"10.1145","author":[{"given":"Poulami","family":"Das","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, India"}]},{"given":"Debapriya","family":"Basu Roy","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, India"}]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, India"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"292","volume-title":"First International Workshop, CHES'99","author":"Coron Jean-S\u00e9bastien","year":"1999","unstructured":"Jean-S\u00e9bastien Coron . Resistance against differential power analysis for elliptic curve cryptosystems. In Cryptographic Hardware and Embedded Systems , First International Workshop, CHES'99 , Worcester, MA, USA , August 12-13, 1999 , Proceedings, pages 292 -- 302 , 1999. Jean-S\u00e9bastien Coron. Resistance against differential power analysis for elliptic curve cryptosystems. In Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pages 292--302, 1999."},{"key":"e_1_3_2_1_2_1","volume-title":"Third International Workshop","author":"Walter Colin D.","year":"2001","unstructured":"Colin D. Walter . Sliding windows succumbs to big mac attack. In Cryptographic Hardware and Embedded Systems - CHES 2001 , Third International Workshop , Paris, France , May 14-16, 2001 , Proceedings, number Generators, pages 286--299, 2001. Colin D. Walter. Sliding windows succumbs to big mac attack. In Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, number Generators, pages 286--299, 2001."},{"key":"e_1_3_2_1_3_1","first-page":"140","volume-title":"13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings","author":"Clavier Christophe","year":"2012","unstructured":"Christophe Clavier , Benoit Feix , Georges Gagnerot , Christophe Giraud , Myl\u00e9ne Roussellet , and Vincent Verneuil . ROSETTA for single trace analysis. In Progress in Cryptology - INDOCRYPT 2012 , 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings , pages 140 -- 155 , 2012 . Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud, Myl\u00e9ne Roussellet, and Vincent Verneuil. ROSETTA for single trace analysis. In Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings, pages 140--155, 2012."},{"key":"e_1_3_2_1_4_1","volume-title":"New Delhi, India","author":"Batina Lejla","year":"2014","unstructured":"Lejla Batina , Lukasz Chmielewski , Louiza Papachristodoulou , Peter Schwabe , and Michael Tunstall . Online template attacks. In Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India , New Delhi, India , December 14-17, 2014 , Proceedings, pages 21--36 , 2014. Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, and Michael Tunstall. Online template attacks. In Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, pages 21--36, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Debapriya Basu Roy, and Debdeep Mukhopadhyay. Exploiting the order of multiplier operands: A low cost approach for HCCA resistance. IACR Cryptology ePrint Archive","author":"Das Poulami","year":"2015","unstructured":"Poulami Das , Debapriya Basu Roy, and Debdeep Mukhopadhyay. Exploiting the order of multiplier operands: A low cost approach for HCCA resistance. IACR Cryptology ePrint Archive , 2015 :925, 2015. Poulami Das, Debapriya Basu Roy, and Debdeep Mukhopadhyay. Exploiting the order of multiplier operands: A low cost approach for HCCA resistance. IACR Cryptology ePrint Archive, 2015:925, 2015."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647094.716715"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0913"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.13"},{"key":"e_1_3_2_1_11_1","volume-title":"Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields. IACR Cryptology ePrint Archive","author":"Longa Patrick","year":"2008","unstructured":"Patrick Longa . Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields. IACR Cryptology ePrint Archive , 2008 :100, 2008. Patrick Longa. Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields. IACR Cryptology ePrint Archive, 2008:100, 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_7"},{"key":"e_1_3_2_1_13_1","first-page":"206","volume-title":"10th International Workshop, FSE 2003","author":"Schramm Kai","year":"2003","unstructured":"Kai Schramm , Thomas J. Wollinger , and Christof Paar . A new class of collision attacks and its application to DES. In Fast Software Encryption , 10th International Workshop, FSE 2003 , Lund, Sweden , February 24-26, 2003 , Revised Papers, pages 206 -- 222 , 2003. Kai Schramm, Thomas J. Wollinger, and Christof Paar. A new class of collision attacks and its application to DES. In Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pages 206--222, 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"Two operands of multipliers in side-channel attack. IACR Cryptology ePrint Archive","author":"Sugawara Takeshi","year":"2015","unstructured":"Takeshi Sugawara , Daisuke Suzuki , and Minoru Saeki . Two operands of multipliers in side-channel attack. IACR Cryptology ePrint Archive , 2015 :291, 2015. Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki. Two operands of multipliers in side-channel attack. IACR Cryptology ePrint Archive, 2015:291, 2015."}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Xi'an China","acronym":"ASIA CCS '16"},"container-title":["Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898420.2901921","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2898420.2901921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:30Z","timestamp":1750222590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898420.2901921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":13,"alternative-id":["10.1145\/2898420.2901921","10.1145\/2898420"],"URL":"https:\/\/doi.org\/10.1145\/2898420.2901921","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}