{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:19:29Z","timestamp":1773800369904,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2996366.2996371","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"27-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor"],"prefix":"10.1145","author":[{"given":"Jacek","family":"Samotyja","sequence":"first","affiliation":[{"name":"Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany"}]},{"given":"Kerstin","family":"Lemke-Rust","sequence":"additional","affiliation":[{"name":"Bonn-Rhein-Sieg University of Applied Science, Sankt Augustin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"RFC 5639: Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. https:\/\/tools.ietf.org\/html\/rfc5639.  RFC 5639: Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. https:\/\/tools.ietf.org\/html\/rfc5639."},{"key":"e_1_3_2_1_2_1","unstructured":"SECLAB_ECC. https:\/\/github.com\/Thileen\/SECLAB_ECC. revision:6d1cdaae8c80d65383eb4267c2603916bfdaf09e.  SECLAB_ECC. https:\/\/github.com\/Thileen\/SECLAB_ECC. revision:6d1cdaae8c80d65383eb4267c2603916bfdaf09e."},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/10958513_17","volume-title":"Information Security, ISC","author":"Akishita T.","year":"2003","unstructured":"T. Akishita and T. Takagi . Zero-value point attacks on elliptic curve cryptosystem . In C. Boyd and W. Mao, editors, Information Security, ISC 2003 , volume 2851 of LNCS , pages 218 -- 233 . Springer , 2003. T. Akishita and T. Takagi. Zero-value point attacks on elliptic curve cryptosystem. In C. Boyd and W. Mao, editors, Information Security, ISC 2003, volume 2851 of LNCS, pages 218--233. Springer, 2003."},{"key":"e_1_3_2_1_4_1","volume-title":"v. O. Alfred J. Menezes and S. A. Vanstone. Handbook of Applied Cryptography","author":"P.","year":"2001","unstructured":"P. C. v. O. Alfred J. Menezes and S. A. Vanstone. Handbook of Applied Cryptography . CRC Press , 2001 . P. C. v. O. Alfred J. Menezes and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 2001."},{"key":"e_1_3_2_1_5_1","series-title":"LNCS","first-page":"21","volume-title":"Progress in Cryptology - INDOCRYPT","author":"Batina L.","year":"2014","unstructured":"L. Batina , L. Chmielewski , L. Papachristodoulou , P. Schwabe , and M. Tunstall . Online template attacks . In W. Meier and D. Mukhopadhyay, editors, Progress in Cryptology - INDOCRYPT 2014 , volume 8885 of LNCS , pages 21 -- 36 . Springer , 2014. L. Batina, L. Chmielewski, L. Papachristodoulou, P. Schwabe, and M. Tunstall. Online template attacks. In W. Meier and D. Mukhopadhyay, editors, Progress in Cryptology - INDOCRYPT 2014, volume 8885 of LNCS, pages 21--36. Springer, 2014."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_1_7_1","volume-title":"Cryptology ePrint Archive","author":"Bernstein D. J.","year":"2008","unstructured":"D. J. Bernstein , P. Birkner , M. Joye , T. Lange , and C. Peters . Twisted Edward Curves . In Cryptology ePrint Archive , 2008 . D. J. Bernstein, P. Birkner, M. Joye, T. Lange, and C. Peters. Twisted Edward Curves. In Cryptology ePrint Archive, 2008."},{"key":"e_1_3_2_1_8_1","unstructured":"D. J. Bernstein and T. Lange. Explicit-formulas database. http:\/\/hyperelliptic.org\/EFD.  D. J. Bernstein and T. Lange. Explicit-formulas database. http:\/\/hyperelliptic.org\/EFD."},{"key":"e_1_3_2_1_9_1","unstructured":"D. J. Bernstein and T. Lange. Performance evaluation of a new coordinate system for elliptic curves. http:\/\/cr.yp.to\/newelliptic\/newelliptic-20070522.pdf 2007.  D. J. Bernstein and T. Lange. Performance evaluation of a new coordinate system for elliptic curves. http:\/\/cr.yp.to\/newelliptic\/newelliptic-20070522.pdf 2007."},{"key":"e_1_3_2_1_10_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"Public Key Cryptography, PKC","author":"Brier E.","year":"2002","unstructured":"E. Brier and M. Joye . Weierstra\u00df Elliptic Curves and Side-Channel Attacks . In D. Naccache and P. Paillier, editors, Public Key Cryptography, PKC 2002 , volume 2274 of LNCS , pages 335 -- 345 . Springer , 2002. E. Brier and M. Joye. Weierstra\u00df Elliptic Curves and Side-Channel Attacks. In D. Naccache and P. Paillier, editors, Public Key Cryptography, PKC 2002, volume 2274 of LNCS, pages 335--345. Springer, 2002."},{"key":"e_1_3_2_1_11_1","first-page":"13","author":"Chari S.","year":"2002","unstructured":"S. Chari , J. R. Rao , and P. Rohatgi . Template attacks. In Jr. et al.citeDBLP:conf\/ches\/ 2002 , pages 13 -- 28 . S. Chari, J. R. Rao, and P. Rohatgi. Template attacks. In Jr. et al.citeDBLP:conf\/ches\/2002, pages 13--28.","journal-title":"Template attacks. In Jr. et al.citeDBLP:conf\/ches\/"},{"key":"e_1_3_2_1_12_1","first-page":"292","volume-title":"Ko\u00e7 and PaarciteDBLP:conf\/ches\/1999","author":"Coron J.","unstructured":"J. Coron . Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems . In Ko\u00e7 and PaarciteDBLP:conf\/ches\/1999 , pages 292 -- 302 . J. Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Ko\u00e7 and PaarciteDBLP:conf\/ches\/1999, pages 292--302."},{"key":"e_1_3_2_1_13_1","first-page":"76","volume-title":"HOST","author":"Fan J.","year":"2010","unstructured":"J. Fan , X. Guo , E. D. Mulder , P. Schaumont , B. Preneel , and I. Verbauwhede . State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures . In HOST 2010 , Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) , pages 76 -- 87 , 2010. J. Fan, X. Guo, E. D. Mulder, P. Schaumont, B. Preneel, and I. Verbauwhede. State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures. In HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pages 76--87, 2010."},{"key":"e_1_3_2_1_14_1","series-title":"LNCS","first-page":"269","volume-title":"C. D. Walter, \u00c7","author":"Fouque P.","year":"2003","unstructured":"P. Fouque and F. Valette . The doubling attack - phWhy Upwards Is Better than Downwards . In C. D. Walter, \u00c7 . K. Ko\u00e7, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2003 , volume 2779 of LNCS , pages 269 -- 280 . Springer , 2003. P. Fouque and F. Valette. The doubling attack - phWhy Upwards Is Better than Downwards. In C. D. Walter, \u00c7. K. Ko\u00e7, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2003, volume 2779 of LNCS, pages 269--280. Springer, 2003."},{"key":"e_1_3_2_1_15_1","series-title":"LNCS","first-page":"199","volume-title":"Public Key Cryptography - PKC","author":"Goubin L.","year":"2003","unstructured":"L. Goubin . A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems . In Y. Desmedt, editor, Public Key Cryptography - PKC 2003 , volume 2567 of LNCS , pages 199 -- 210 . Springer , 2003. L. Goubin. A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. In Y. Desmedt, editor, Public Key Cryptography - PKC 2003, volume 2567 of LNCS, pages 199--210. Springer, 2003."},{"key":"e_1_3_2_1_16_1","first-page":"551","author":"Ha J.","year":"2002","unstructured":"J. Ha and S. Moon . Randomized signed-scalar multiplication of ECC to resist power attacks. In Jr. et al.citeDBLP:conf\/ches\/ 2002 , pages 551 -- 563 . J. Ha and S. Moon. Randomized signed-scalar multiplication of ECC to resist power attacks. In Jr. et al.citeDBLP:conf\/ches\/2002, pages 551--563.","journal-title":"In Jr. et al.citeDBLP:conf\/ches\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Guide to Elliptic Curve Cryptography","author":"Hankerson D.","year":"2004","unstructured":"D. Hankerson , S. Vanstone , and A. J. Menezes . Guide to Elliptic Curve Cryptography . Springer , 2004 . D. Hankerson, S. Vanstone, and A. J. Menezes. Guide to Elliptic Curve Cryptography. Springer, 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2012.030615"},{"key":"e_1_3_2_1_19_1","unstructured":"M. Inc. LOTUS High-Performance Wireless Sensor Network Platform Datasheet. http:\/\/www.memsic.com\/wireless-sensor-networks\/.  M. Inc. LOTUS High-Performance Wireless Sensor Network Platform Datasheet. http:\/\/www.memsic.com\/wireless-sensor-networks\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2349007"},{"key":"e_1_3_2_1_21_1","series-title":"LNCS","volume-title":"Cryptographic Hardware and Embedded Systems - CHES","author":"Ko\u00e7 B. S. K. Jr.","year":"2002","unstructured":"B. S. K. Jr. , \u00c7. K. Ko\u00e7 , and C. Paar , editors . Cryptographic Hardware and Embedded Systems - CHES 2002 , volume 2523 of LNCS . Springer , 2003. B. S. K. Jr., \u00c7. K. Ko\u00e7, and C. Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of LNCS. Springer, 2003."},{"key":"e_1_3_2_1_22_1","volume-title":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik","author":"Killmann W.","year":"2011","unstructured":"W. Killmann , T. Lange , M. Lochter , W. Thumser , and G. Wicke . Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations, Version 1.0.4 . Bundesamt f\u00fcr Sicherheit in der Informationstechnik , Bonn, Germany , 2011 . W. Killmann, T. Lange, M. Lochter, W. Thumser, and G. Wicke. Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations, Version 1.0.4. Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Bonn, Germany, 2011."},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","volume-title":"First International Workshop, CHES'99","author":"Ko\u00e7 K.","year":"1999","unstructured":"\u00c7. K. Ko\u00e7 and C. Paar , editors . Cryptographic Hardware and Embedded Systems , First International Workshop, CHES'99 , volume 1717 of LNCS . Springer , 1999 . \u00c7. K. Ko\u00e7 and C. Paar, editors. Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, volume 1717 of LNCS. Springer, 1999."},{"key":"e_1_3_2_1_24_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO '96","author":"Kocher P. C.","year":"1996","unstructured":"P. C. Kocher . Timing Attacks on Implementations of Diffie-Hellman , RSA, DSS, and Other Systems. In N. Koblitz, editor, Advances in Cryptology - CRYPTO '96 , volume 1109 of LNCS , pages 104 -- 113 . Springer , 1996 . P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In N. Koblitz, editor, Advances in Cryptology - CRYPTO '96, volume 1109 of LNCS, pages 104--113. Springer, 1996."},{"key":"e_1_3_2_1_25_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO '99","author":"Kocher P. C.","year":"1999","unstructured":"P. C. Kocher , J. Jaffe , and B. Jun . Differential Power Analysis . In M. J. Wiener, editor, Advances in Cryptology - CRYPTO '99 , volume 1666 of LNCS , pages 388 -- 397 . Springer , 1999 . P. C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. J. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 388--397. Springer, 1999."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"P.-Y.\n      Liardet\n     and \n      N. P.\n      Smart\n  . \n  Preventing SPA\/DPA in ECC Systems Using the Jacobi Form. In \u00c7\n  . K. Ko\u00e7 D. Naccache and C. Paar editors Cryptographic Hardware and Embedded Systems - CHES \n  2001 volume \n  2162\n   of \n  LNCS pages \n  391\n  --\n  401\n  . \n  Springer 2001.   P.-Y. Liardet and N. P. Smart. Preventing SPA\/DPA in ECC Systems Using the Jacobi Form. In \u00c7. K. Ko\u00e7 D. Naccache and C. Paar editors Cryptographic Hardware and Embedded Systems - CHES 2001 volume 2162 of LNCS pages 391--401. Springer 2001.","DOI":"10.1007\/3-540-44709-1_32"},{"key":"e_1_3_2_1_27_1","volume-title":"Revealing the Secrets of Smart Cards","author":"Mangard S.","year":"2007","unstructured":"S. Mangard , E. Oswald , and T. Popp . Power Analysis Attacks , Revealing the Secrets of Smart Cards . Vieweg Verlag , 2007 . S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks, Revealing the Secrets of Smart Cards. Vieweg Verlag, 2007."},{"key":"e_1_3_2_1_28_1","first-page":"144","author":"Messerges T. S.","year":"1999","unstructured":"T. S. Messerges , E. A. Dabbish , and R. H. Sloan . Power Analysis Attacks of Modular Exponentiation in Smartcards. In Ko\u00e7 and PaarciteDBLP:conf\/ches\/ 1999 , pages 144 -- 157 . T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcards. In Ko\u00e7 and PaarciteDBLP:conf\/ches\/1999, pages 144--157.","journal-title":"Power Analysis Attacks of Modular Exponentiation in Smartcards. In Ko\u00e7 and PaarciteDBLP:conf\/ches\/"},{"key":"e_1_3_2_1_29_1","volume-title":"Verlagshaus Monsenstein und Vannerdat","author":"Mirbach A.","year":"2003","unstructured":"A. Mirbach . Elliptische Kurven, Die Bestimmung ihrer Punktezahl und Anwendungen in der Krypotographie . Verlagshaus Monsenstein und Vannerdat , 2003 . A. Mirbach. Elliptische Kurven, Die Bestimmung ihrer Punktezahl und Anwendungen in der Krypotographie. Verlagshaus Monsenstein und Vannerdat, 2003."},{"key":"e_1_3_2_1_30_1","volume-title":"Cryptology ePrint Archive","author":"Moloney R.","year":"2009","unstructured":"R. Moloney , G. McGuire , and M. Markowitz . Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion . In Cryptology ePrint Archive , 2009 . R. Moloney, G. McGuire, and M. Markowitz. Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion. In Cryptology ePrint Archive, 2009."},{"key":"e_1_3_2_1_31_1","volume-title":"July","author":"Recommended Elliptic NIST.","year":"1999","unstructured":"NIST. Recommended Elliptic Curves for Federal Government Use . http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/dss\/NISTReCur.pdf , July 1999 . NIST. Recommended Elliptic Curves for Federal Government Use. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/dss\/NISTReCur.pdf, July 1999."},{"key":"e_1_3_2_1_32_1","volume-title":"Cryptology ePrint Archive","author":"Samotyja J.","year":"2015","unstructured":"J. Samotyja , K. Lemke-Rust , and M. Ullmann . SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node . In Cryptology ePrint Archive , 2015 . J. Samotyja, K. Lemke-Rust, and M. Ullmann. SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node. In Cryptology ePrint Archive, 2015."},{"key":"e_1_3_2_1_33_1","unstructured":"S. C. Shantz. From Euclid's GCD to Montgomery Multiplication to the Great Divide. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.140.7944&rep=rep1&type=pdf June 2001.  S. C. Shantz. From Euclid's GCD to Montgomery Multiplication to the Great Divide. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.140.7944&rep=rep1&type=pdf June 2001."},{"key":"e_1_3_2_1_34_1","first-page":"59","volume-title":"Proceedings of the Fifth Smart Card Research and Advanced Application Conference, CARDIS '02","author":"Walter C. D.","year":"2002","unstructured":"C. D. Walter . Breaking the Liardet-Smart Randomized Exponentiation Algorithm . In P. Honeyman , editor , Proceedings of the Fifth Smart Card Research and Advanced Application Conference, CARDIS '02 , pages 59 -- 68 . USENIX, 2002 . C. D. Walter. Breaking the Liardet-Smart Randomized Exponentiation Algorithm. In P. Honeyman, editor, Proceedings of the Fifth Smart Card Research and Advanced Application Conference, CARDIS '02, pages 59--68. USENIX, 2002."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM Workshop on Theory of Implementation Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996366.2996371","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2996366.2996371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:10Z","timestamp":1750220590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996366.2996371"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":34,"alternative-id":["10.1145\/2996366.2996371","10.1145\/2996366"],"URL":"https:\/\/doi.org\/10.1145\/2996366.2996371","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}